Hosting Roadmap Upgrades, Improvements and Changes

Size: px
Start display at page:

Download "Hosting Roadmap Upgrades, Improvements and Changes"

Transcription

1 Hosting Roadmap 2014 Upgrades, Improvements and Changes

2 Objectives First and Foremost : Uptime Denial of Service (DDoS) Attack Mitigation Mitigate Hacking Attempts Eliminate Media Outages (95% of the data) Facilitate/improve Disaster Recovery

3 PROTECT AND DIRECT

4 Service Isolation private /app public /page /pushpage ecosystem /api Each service has a different profile in its demand for hosting resourcing Cachability Security Risk Impact of downtime on school

5 Milestones for 2014 Mitigate E-Plus Audit DNS (Load Balancing v. Failover) Media (Photos, Video, Audio,...) Content moved to the Cloud (S3 + CDN) Public Site Caching (whole site v. individual media content) SQL Database AlwaysOn (AWS) Distributed Denial of Service Services (DDoS) in the Cloud Web Application Firewall (WAF) Services in the Cloud Multi-Location Servicing Cloud Based Disaster Recovery (DR)

6 eplus Comprehensive outside audit performed for security and best practice in the datacenter All recommendations implemented with the exception of items discussed today. Recovery Time Improvements.

7 What is a Domain Name System (DNS) Service? DNS is a globally distributed service that translates human readable names like www. example.com into the numeric IP addresses like that computers use to connect to each other. The Internet s DNS system works much like a phone book by managing the mapping between names and numbers. For DNS, the names are domain names ( that are easy for people to remember and the numbers are IP addresses ( ) that specify the location of computers on the Internet. DNS servers translate requests for names into IP addresses, controlling which server an end user will connect to when they type a domain name into their web browser.

8 PUBLIC DNS Today schoolname.org + ssl schoolname.edu + ssl schoolname.com + ssl

9 PUBLIC DNS Tomorrow schoolname.org schoolname.com schoolname.edu DIRECTION Cloud (aws) Datacenter (xand) Disaster Recovery

10 PUBLIC Internet Routers Firewalls Load Balancers DataCenter (XAND) Media Services Web Services Database SAN

11 PUBLIC Internet Routers Firewalls Load Balancers DataCenter (XAND) Web Services Media Services Database SAN Media Services S3

12 Public Site Caching Caching entire pages, not just images Improves Performance Allows the last valid state of your site to continue to be served even in a complete failure.

13 DNS Load Balancing and Failover High Availability Media in the Cloud Public Caching DDoS Attack Mitigation Web Application Firewall Service Isolation Geographic Redundancy

14 APP Internet DataCenter (XAND) Protect & Direct Primary Services Backup Services

15 APP Internet Denial of Service Attacks (DDos) DataCenter (XAND) Routers Firewalls Load Balancers Web Services Media Services Database SAN

16 Routers Firewalls Load Balancers WAF Routers Firewalls Load Balancers DataCenter (XAND) Web Services Media Services Database SAN APP

17 Service Delivery private /app public /page /pushpage ecosystem /api schoolname.onwhipplehill.com schoolname.myschoolapp.com

18

19

20 Examples of Domain Consolidation

21

22

23

24 Bottom line Impact Has no effect on your public website. Does not affect schools on Podium. Changes are made during upgrade or redesign. If you have already upgraded, change can be made any time. Change not required in 2013/14 school year.

25 Routers Firewalls Load Balancers DataCenter (XAND) Web Services Web Services Database alwayson Media Services Database alwayson Media Services Database alwayson

26 Geographic Redundancy schoolname.org schoolname.com schoolname.edu DIRECTION Cloud (aws) Datacenter (xand) Disaster Recovery

27 Milestones Mitigate E-Plus Audit DNS (Load Balancing v. Failover) Media (Photos, Video, Audio,...) Content moved to the Cloud (S3 + CDN) Public Site Caching (whole site v. individual media content) SQL Database AlwaysOn (AWS) Distributed Denial of Service Services (DDoS) in the Cloud Web Application Firewall (WAF) Services in the Cloud Multi-Location Servicing Cloud Based Disaster Recovery (DR)

28 Thank-you x 3224

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo

Document Sub Title. Yotpo. Technical Overview 07/18/ Yotpo Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time

More information

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of

More information

Clusters Your Way. SQL Server in "The Cloud": High Availability and Disaster Recovery in Azure, AWS and Google

Clusters Your Way. SQL Server in The Cloud: High Availability and Disaster Recovery in Azure, AWS and Google Clusters Your Way SQL Server in "The Cloud": High Availability and Disaster Recovery in Azure, AWS and Google Jason Aw, Strategic Business Development Copyright 2017 SIOS Technology Corp. All rights reserved.

More information

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud

More information

Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services. Beyond virtualization

Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services. Beyond virtualization Beyond virtualization Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services The power of many servers, the simplicity of one Efficiently manage infrastructure

More information

Imperva Incapsula Product Overview

Imperva Incapsula Product Overview Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security

More information

Virtual protection gets real

Virtual protection gets real Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce

More information

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter How your network can take on the cloud and win Think beyond traditional networking toward a secure digital perimeter Contents Introduction... 3 Reduce risk points with secure, contextualized access...

More information

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft Azure Webinar Resilient Solutions March 2017 Sander van den Hoven Principal Technical Evangelist Microsoft DX @svandenhoven 1 What is resilience? Client Client API FrontEnd Client Client Client Loadbalancer

More information

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved. April 14, 2016 You Might Know Us As. 2012 2014 2 TierPoint Corporate Overview TierPoint Data Center Footprint* TierPoint Key Statistics Employees: 870 Markets: 24 Data Centers: 38 Total Raised Floor: 599,000

More information

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS Dr Adnene Guabtni, Senior Research Scientist, NICTA/Data61, CSIRO Adnene.Guabtni@csiro.au EC2 S3 ELB RDS AMI

More information

Citrix Workspace Cloud

Citrix Workspace Cloud Citrix Workspace Cloud Roger Bösch Citrix Systems International GmbH Workspace Cloud is a NEW Citrix Management and Delivery Platform Customers Now Have a Spectrum of Workspace Delivery Options Done By

More information

InterCall Virtual Environments and Webcasting

InterCall Virtual Environments and Webcasting InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT

More information

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE

SCALEFAST COMMERCE CLOUD INFRASTRUCTURE SCALEFAST COMMERCE CLOUD INFRASTRUCTURE ALWAYS-ON, GLOBAL ECOMMERCE INFRASTRUCTURE Scalefast provides the highest level of availability, performance and security for your online store. We take care of

More information

E-Commerce Networking

E-Commerce Networking NW2000 1 E- ing Session 2 E-Business Solution Suppliers/ Manufacturers Supply Chain Management Business Partners E- Customers Customer Care Resellers Employees Your Company E- Learning 3 1999 E- Data During

More information

Disaster Recovery and Mitigation: Is your business prepared when disaster hits?

Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 1 Disaster Recovery and Mitigation: Is your business prepared when disaster hits? 2 Our speaker today: Catherine Roy, Director of PMO at Hosting 15 years Project Management experience At HOSTING since

More information

Web Hosting Solution Best Practices

Web Hosting Solution Best Practices Web Hosting Solution Best Practices Versión 1.0 Telefónica Open Cloud_ INDEX 1. Introduction 2. Web Application Hosting Using Traditional Methods 2.1. Overview 2.2. Traditional Web Hosting Architecture

More information

Security Overview and Cisco ACE Replacement

Security Overview and Cisco ACE Replacement Security Overview and Cisco ACE Replacement March, 2014 Florian Hartmann, Senior Systems Engineer DACH A10 Corporate Introduction Headquarters in San Jose 800+ Employees Offices in 32 countries Customers

More information

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline

Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline Comprehensive DDoS Attack Protection: Cloud-based, Enterprise Grade Mitigation F5 Silverline PRESENTED BY: RICH BIBLE, EMEA SILVERLINE SA November 22, 2018 1 2018 F5 NETWORKS DDoS and Application Attack

More information

High Availability and Disaster Recovery for the Genesys SMS Aggregation Service. Disaster Recovery

High Availability and Disaster Recovery for the Genesys SMS Aggregation Service. Disaster Recovery High Availability and Disaster Recovery for the Genesys SMS Aggregation Service Disaster Recovery 12/25/2017 Contents 1 Disaster Recovery 1.1 HTTP API 1.2 SMSC API High Availability and Disaster Recovery

More information

Everything You Need To Know About Oracle & Storage Foundation HA

Everything You Need To Know About Oracle & Storage Foundation HA 2012 Symantec Vision Everything You Need To Know About Oracle & Storage Foundation HA MITIGATE IT RISK WITH STORAGE FOUNDATION HA TO AVOID DOWNTIME AND ACCELERATE SERVICE RECOVERY Chris Atkinson Regional

More information

AWS Well Architected Framework

AWS Well Architected Framework AWS Well Architected Framework What We Will Cover The Well-Architected Framework Key Best Practices How to Get Started Resources Main Pillars Security Reliability Performance Efficiency Cost Optimization

More information

Microsoft Azure Windows Server Microsoft System Center

Microsoft Azure Windows Server Microsoft System Center Windows Server Microsoft System Center Microsoft s Disaster Recovery Stack Simplified protection and recovery, built into Windows Server with Windows Server Backup Enhanced through integration with Backup

More information

Designing Internet Commerce and Content Networking Architectures

Designing Internet Commerce and Content Networking Architectures 1346_06_2000_c2_sec1 11 Designing Internet Commerce and Content Networking Architectures Session 2 Agenda ngle te Architecture: Douglas Gourlay Global Server Load Balancing: Eliot Lear Content Distribution

More information

SQL Server AlwaysOn setup on ObserveIT environment

SQL Server AlwaysOn setup on ObserveIT environment SQL Server AlwaysOn setup on ObserveIT environment Overview ObserveIT can be easily installed on a SQL Server AlwaysOn environment. The AlwaysOn is part of Microsoft SQL Server Enterprise Edition and should

More information

TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM

TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM TECHNICAL INFRASTRUCTURE AND SECURITY PANOPTO ONLINE VIDEO PLATFORM CONTENTS Introduction... 3 Architecture... 3 Hardware and Software... 3 Panopto Components/Prerequisites... 3 Amazon Server Locations...

More information

Building Clusters to Protect SQL Server in Cloud Configurations

Building Clusters to Protect SQL Server in Cloud Configurations Building Clusters to Protect SQL Server in Cloud Configurations David Bermingham Senior Technical Evangelist, SIOS Technology Microsoft Cloud & Datacenter MVP (2010-Present) Copyright @ 2017 SIOS Technology

More information

SQL Server Virtualization 201

SQL Server Virtualization 201 Virtualization 201 Management and Risk Mitigation PASS Virtualization Virtual Chapter 2014.05.15 About David Klee @kleegeek davidklee.net gplus.to/kleegeek linked.com/a/davidaklee Specialties / Focus Areas

More information

A different approach to Application Security

A different approach to Application Security 雲端時代企業應用的安全與挑戰 A different approach to Application Security Protecting your most critical business assets APPLICATION ACCESS APPLICATION PROTECTION F5 Networks, Inc 2 F5 s Comprehensive Security Solutions

More information

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics

What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics What s next for your data center? Power Your Evolution with Physical and Virtual ADCs. Jeppe Koefoed Wim Zandee Field sales, Nordics Vision: Everything as a service Speed Scalability Speed to Market

More information

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead

Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead Sucuri Webinar Q&A HOW TO IDENTIFY AND FIX A HACKED WORDPRESS WEBSITE. Ben Martin - Remediation Team Lead 1 Question #1: How does the site know to call San Diego and not the New York PoP of a CDN? Answer:

More information

Ryan Adams Blog - Twitter Thanks to our Gold Sponsors

Ryan Adams Blog -   Twitter  Thanks to our Gold Sponsors Ryan Adams Blog - http://ryanjadams.com Twitter - @ryanjadams Email ryan@ryanjadams.com Thanks to our Gold Sponsors Discover the AlwaysOn Feature Set AlwaysOn Failover Cluster Instances AlwaysOn Availability

More information

ScaleArc for SQL Server

ScaleArc for SQL Server Solution Brief ScaleArc for SQL Server Overview Organizations around the world depend on SQL Server for their revenuegenerating, customer-facing applications, running their most business-critical operations

More information

Networks

Networks Networks +617 3222 2555 info@citec.com.au Queensland Government Network (QGN) Our Queensland Government Network (QGN) is central to the ICT services we provide. It is a government owned and managed network,

More information

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP

Pasiruoškite ateičiai: modernus duomenų centras. Laurynas Dovydaitis Microsoft Azure MVP Pasiruoškite ateičiai: modernus duomenų centras Laurynas Dovydaitis Microsoft Azure MVP 2016-05-17 Tension drives change The datacenter today Traditional datacenter Tight coupling between infrastructure

More information

The New Net, Edge Computing, and Services. Michael R. Nelson, Ph.D. Tech Strategy, Cloudflare May 2018

The New Net, Edge Computing, and Services. Michael R. Nelson, Ph.D. Tech Strategy, Cloudflare May 2018 The New Net, Edge Computing, and Services Michael R. Nelson, Ph.D. Tech Strategy, Cloudflare MNELSON@CLOUDFLARE.COM or @MikeNelson May 2018 We are helping build a better Internet Cloudflare is an Edge

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information

CogniFit Technical Security Details

CogniFit Technical Security Details Security Details CogniFit Technical Security Details CogniFit 2018 Table of Contents 1. Security 1.1 Servers........................ 3 1.2 Databases............................3 1.3 Network configuration......................

More information

THE UTILITY OF DNS TRAFFIC MANAGEMENT

THE UTILITY OF DNS TRAFFIC MANAGEMENT SECURITY SERVICES WHITE PAPER THE UTILITY OF DNS TRAFFIC MANAGEMENT TABLE OF CONTENTS 2 ABOUT DNS 3 DNS TRAFFIC MANAGEMENT 4 MONITORING AND FAILOVER 5 TRAFFIC MANAGEMENT MONITORING PROBES 6 GLOBAL LOAD

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

The Interactive Guide to Protecting Your Election Website

The Interactive Guide to Protecting Your Election Website The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,

More information

Architecting Microsoft Azure Solutions (proposed exam 535)

Architecting Microsoft Azure Solutions (proposed exam 535) Architecting Microsoft Azure Solutions (proposed exam 535) IMPORTANT: Significant changes are in progress for exam 534 and its content. As a result, we are retiring this exam on December 31, 2017, and

More information

Security and Compliance at Mavenlink

Security and Compliance at Mavenlink Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure

More information

Index. Peter A. Carter 2016 P.A. Carter, SQL Server AlwaysOn Revealed, DOI /

Index. Peter A. Carter 2016 P.A. Carter, SQL Server AlwaysOn Revealed, DOI / Index A Active node, 10 Advanced Encryption Standard (AES), 95 AlwaysOn administration Availability Group (see AlwaysOn Availability Groups) cluster maintenance, 149 Cluster Node Configuration page, 153

More information

Safeguard Application Uptime and Consistent Performance

Safeguard Application Uptime and Consistent Performance Safeguard Application Uptime and Consistent Performance A software-first approach to delivering applications across hybrid and multi-cloud architectures. 1 Safeguard Application Uptime and Consistent Performance

More information

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved

How to Choose a CDN. Improve Website Performance and User Experience. Imperva, Inc All Rights Reserved How to Choose a CDN Improve Website Performance and User Experience Imperva, Inc. 2017 All Rights Reserved CONTENTS Introduction...3 How Does a CDN Work?...5 The Most Important Factors to Consider When

More information

NEXT GENERATION CLOUD SECURITY

NEXT GENERATION CLOUD SECURITY SESSION ID: CMI-F02 NEXT GENERATION CLOUD SECURITY Myles Hosford Head of FSI Security & Compliance Asia Amazon Web Services Agenda Introduction to Cloud Security Benefits of Cloud Security Cloud APIs &

More information

Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Disaster Recovery and Business A Rackspace White Paper Spring 2010 Summary The purpose of this guide is to cut through the jargon around Business and Disaster Recovery, explain the differences and help

More information

Configuring and Deploying a Private Cloud DURATION: Days

Configuring and Deploying a Private Cloud DURATION: Days Configuring and Deploying a Private Cloud DURATION: Days DESCRIPTION This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012 R2. OBJECTIVE

More information

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data Workloads in the cloud need a backup solution in the cloud. For companies with traditional

More information

Management and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks

Management and Orchestration with F5 BIG-IQ 4.5. Philippe Bogaerts F5 Networks Management and Orchestration with F5 BIG-IQ 4.5 Philippe Bogaerts F5 Networks F5 Synthesis High-Performance Services Fabric Simplified Business Models F5 Networks, Inc 2 BIG-IQ in the Synthesis Framework

More information

Keys to a more secure data environment

Keys to a more secure data environment Keys to a more secure data environment A holistic approach to data infrastructure security The current fraud and regulatory landscape makes it clear that every firm needs a comprehensive strategy for protecting

More information

Information Security Policy

Information Security Policy Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated

More information

The OnApp Cloud Platform

The OnApp Cloud Platform The OnApp Cloud Platform Everything you need to sell cloud, dedicated, CDN, storage & more 286 Cores / 400 Cores 114 Cores 218 10 86 20 The complete cloud platform for service providers OnApp software

More information

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise

More information

F5 Synthesis Information Session. April, 2014

F5 Synthesis Information Session. April, 2014 F5 Synthesis Information Session April, 2014 Agenda Welcome and Introduction to Customer Technology Challenges Software Defined Application Services Reference Architectures for Today s Customer Challenges

More information

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution.

Hosted Azure for your business. Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Hosted Azure for your business Build virtual servers, deploy with flexibility, and reduce your hardware costs with a managed cloud solution. Azure is approximately 50 percent cheaper than other cloud services

More information

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Flex Tenancy :48:27 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Flex Tenancy 2015-04-28 17:48:27 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Flex Tenancy... 3 Flex Tenancy... 4 Understanding the Flex Tenancy

More information

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure BEST PRACTICES: LEVERAGING CLOUD AND COLOCATION TO AVOID DOWNTIME Business continuity implementations that address traditional and emerging threats KEY TAKEAWAYS The cost for unplanned downtime has never

More information

High Availability and Disaster Recovery. Cherry Lin, Jonathan Quinn

High Availability and Disaster Recovery. Cherry Lin, Jonathan Quinn High Availability and Disaster Recovery Cherry Lin, Jonathan Quinn Managing the Twin Risks to your Operations Data Loss Down Time The Three Approaches Backups High Availability Disaster Recovery Geographic

More information

NIH LIS System & Network Diagram

NIH LIS System & Network Diagram NIH LIS System & Network Diagram Terminal Servers Printers Report Servers/Formatters Citrix Server Production Network Hospital Network ( Network) Modem 4-PORT DIGI 137.187.118.222 digi2 137.187.118.219

More information

Custom hosting solutions orchastrated for your needs.

Custom hosting solutions orchastrated for your needs. Custom hosting solutions orchastrated for your needs. Cloud Hosting IaaS Colocation DRaaS & Backup Hosting AWS Monitoring PaaS/CaaS (for Developers) Why Customers Choose Us Whether you re just starting

More information

CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016

CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016 CLOUD SECURITY: THE CHALLENGES FOR THE DATA CENTRE AND IT ENVIRONMENT NOVEMBER 2016 1 ENTERPRISE IT STRATEGY DEFINED BY VARIOUS STAKEHOLDERS CIO CFO CISO Business User Become provider of choice Need easy

More information

Maximum Security, Zero Compromise in Availability and Performance

Maximum Security, Zero Compromise in Availability and Performance Maximum Security, Zero Compromise in Availability and Performance Presented by: Teong Eng Guan MD ASEAN 2 2 Agenda Who is F5 and what to we do? IT Challenges Web Application Security Why & How? Total Defense

More information

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below

More information

VMware, Cisco and EMC The VCE Alliance

VMware, Cisco and EMC The VCE Alliance ware, Cisco and EMC The VCE Alliance Juan Carlos Bonilla ware Luis Pérez Cisco Aarón Sánchez EMC October, 2009 1 The VCE Positioning - Where is the Problem? Source: IDC 2008 2 Where is the Problem? The

More information

Parallels Virtuozzo Containers

Parallels Virtuozzo Containers What s New Document for Service Providers Parallels Virtuozzo Containers www.parallels.com Version 4.0 Introduction to Virtuozzo Containers Parallels Virtuozzo Containers is the hosting industry s leading

More information

Title: Planning AWS Platform Security Assessment?

Title: Planning AWS Platform Security Assessment? Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning

More information

Hosting with Eduphoria

Hosting with Eduphoria Hosting with Eduphoria Hosted Migration Process What does my district need to do? How will this migration effect my district? Eduphoria's Hosted Environment Hosted vs Self hosted features User Account

More information

Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA)

Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA) TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware's Application Front End solution for Microsoft Exchnage 2003 Outlook Web Access (OWA) INTRODUCTION... 2 SOLUTION DETAILS... 3 HOW IT WORKS... 3 SOFTWARE

More information

Advanced Techniques for DDoS Mitigation and Web Application Defense

Advanced Techniques for DDoS Mitigation and Web Application Defense Advanced Techniques for DDoS Mitigation and Web Application Defense Dr. Andrew Kane, Solutions Architect Giorgio Bonfiglio, Technical Account Manager June 28th, 2017 2017, Amazon Web Services, Inc. or

More information

Information System Security. Nguyen Ho Minh Duc, M.Sc

Information System Security. Nguyen Ho Minh Duc, M.Sc Information System Security Nguyen Ho Minh Duc, M.Sc Contact 2 Nguyen Ho Minh Duc Phone: 0935 662211 E-mail: duc.nhm@gmail.com Web:http://nhmduc.wordpress.com 3 Lecture 01 INTRODUCTION Topics 4 What information

More information

Let s say that hosting a cloudbased application is like car ownership

Let s say that hosting a cloudbased application is like car ownership Let s say that hosting a cloudbased application is like car ownership Azure App Service App Service Features & Capabilities All features and capabilities are shared across all of App Service application

More information

CAMPUSPRESS TECHNICAL & SECURITY GUIDE

CAMPUSPRESS TECHNICAL & SECURITY GUIDE CAMPUSPRESS TECHNICAL & SECURITY GUIDE CAMPUSPRESS 2 WHAT IS IN THIS GUIDE? TABLE OF CONTENTS INTRODUCTION... 3 HOSTING... 5 DATACENTERS & HOSTING REGIONS... 6 BACKUPS AND DISASTER RECOVERY... 8 RELIABILITY

More information

AGENDA ITEM: 3.4 DATE OF MEETING: 3 MAY 2018 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE

AGENDA ITEM: 3.4 DATE OF MEETING: 3 MAY 2018 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE AGENDA ITEM: 3.4 INFORMATION MANAGEMENT, TECHNOLOGY & GOVERNANCE COMMITTEE DATE OF MEETING: 3 MAY 2018 Subject: Approved and Presented by: Prepared by: Other Committees and meetings considered at: Considered

More information

Application Delivery Solution Ensure Availability, Performance and Security of Mission-critical Applications in the Physical and Virtual Data Center

Application Delivery Solution Ensure Availability, Performance and Security of Mission-critical Applications in the Physical and Virtual Data Center Application Delivery Solution Ensure Availability, Performance and Security of Mission-critical Applications in the Physical and Virtual Data Center - Whitepaper Table of Contents Executive Summary...

More information

A Guide to Architecting the Active/Active Data Center

A Guide to Architecting the Active/Active Data Center White Paper A Guide to Architecting the Active/Active Data Center 2015 ScaleArc. All Rights Reserved. White Paper The New Imperative: Architecting the Active/Active Data Center Introduction With the average

More information

The DNS of Things. A. 2001:19b8:10 1:2::f5f5:1d Q. WHERE IS Peter Silva Sr. Technical Marketing

The DNS of Things. A. 2001:19b8:10 1:2::f5f5:1d Q. WHERE IS  Peter Silva Sr. Technical Marketing The DNS of Things Peter Silva Sr. Technical Marketing Manager @psilvas Q. WHERE IS WWW.F5.COM? A. 2001:19b8:10 1:2::f5f5:1d Advanced threats Software defined everything SDDC/Cloud Internet of Things Mobility

More information

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions 1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler

More information

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.) We b Ap p A t ac ks U ser / Iden tity 33% 53% Apps And Identities Initial Targets In 86% Of Breaches P hysi ca l 11% Other (VPN, PoS,infra.) 3% Fix vulnerabilities Stop web attacks Risk & compliance What

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Magento Commerce Architecture and Security Model Last updated: Aug 2017

Magento Commerce Architecture and Security Model Last updated: Aug 2017 Magento Commerce Architecture and Security Model Last updated: Aug 2017 Architecture The Magento Commerce architecture is designed to provide a highly secure environment. Each customer is deployed into

More information

Powerful application delivery, security, performance and reliability

Powerful application delivery, security, performance and reliability Powerful application delivery, security, performance and reliability Snapt Summary Snapt develops high-end solutions for application delivery. We provide load balancing, web acceleration, caching and security

More information

Developing Microsoft Azure Solutions

Developing Microsoft Azure Solutions 1 Developing Microsoft Azure Solutions Course Prerequisites A general understanding of ASP.NET and C# concepts Upon Completion of this Course, you will accomplish following: Compare the services available

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

Oracle IaaS, a modern felhő infrastruktúra

Oracle IaaS, a modern felhő infrastruktúra Sárecz Lajos Cloud Platform Sales Consultant Oracle IaaS, a modern felhő infrastruktúra Copyright 2017, Oracle and/or its affiliates. All rights reserved. Azure Window collapsed Oracle Infrastructure as

More information

Copyright 2012 EMC Corporation. All rights reserved.

Copyright 2012 EMC Corporation. All rights reserved. 1 2 AccessAnywhere TM ProtectEverywhere TM Application Availability and Recovery in Distributed Datacenter Environments Horia Constantinescu Sales Territory Manager, EMEA EMC RecoverPoint EMC VPLEX T:

More information

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook

Kerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class  , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,

More information

Atmosphere Fax Network Architecture Whitepaper

Atmosphere Fax Network Architecture Whitepaper Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11

More information

High Availability & Disaster Recovery. Witt Mathot

High Availability & Disaster Recovery. Witt Mathot High Availability & Disaster Recovery Witt Mathot Managing the Twin Risks to your Operations Data Loss Down Time Business Continuity Terminology Resiliency High Availability RTO Round Robin Cost Business

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Safe Harbor Statement

Safe Harbor Statement Demand More. Do More. With AT&T Business Solutions Anders Juhlin Sales Centre Vice President Nordic Countries AT&T Business Solutions AT&T, AT&T logo and other marks contained herein are trademarks of

More information

For Australia January 2018

For Australia January 2018 For Australia January 2018 www.sysaid.com SysAid Cloud Architecture Including Security and Disaster Recovery Plan 2 This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and

More information

SQL Azure. Abhay Parekh Microsoft Corporation

SQL Azure. Abhay Parekh Microsoft Corporation SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure

More information

Core Services for ediscovery Perfection

Core Services for ediscovery Perfection BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist

More information

Updating your Database Skills to Microsoft SQL Server 2012

Updating your Database Skills to Microsoft SQL Server 2012 Course 40008A: Updating your Database Skills to Microsoft SQL Server 2012 Course Details Course Outline Module 1: Introducing SQL Server 2012 This module provides an overview of SQL Server 2012. Overview

More information

Concord Fax Network Architecture. White Paper

Concord Fax Network Architecture. White Paper Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About

More information

How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform

How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform How to Lift-and-Shift a Line of Business Application onto Google Cloud Platform by Andy Wu, Solutions Architect, Magenic White Paper How to Lift-and-Shift a Line of Business Application onto Google Cloud

More information

Cloud Security Myths Paul Mazzucco, Chief Security Officer

Cloud Security Myths Paul Mazzucco, Chief Security Officer Cloud Security Myths Paul Mazzucco, Chief Security Officer Discussion Points >Yesterday s standards: today s security myths >Cloud security: an ongoing mandate >Actions to take now 90% of Businesses Breached

More information

Hybride Cloud Szenarien HHochverfügbar mit KEMP Loadbalancern. Köln am 10.Oktober 2017

Hybride Cloud Szenarien HHochverfügbar mit KEMP Loadbalancern. Köln am 10.Oktober 2017 Hybride Cloud Szenarien HHochverfügbar mit KEMP Loadbalancern Köln am 10.Oktober 2017 Manfred Pfeifer PreSales Consultant DACH & EE @ KEMP Technologies Email: mpfeifer@kemptechnologies.com Office: +49

More information