SlideShare a Scribd company logo
1 of 2
Download to read offline
ENTERPRISE CLOUD AND MANAGED HOSTING




Enterprise-Class Security



 OpSource Security                                         customers are able to configure VLANs between
 With the constant threat of security breaches, having     servers, configure ACL-based firewalls, and control and
 a clear and robust security implementation is a           track administrative usage. Data is
 necessity, not an option. With OpSource Managed           encrypted while being transferred as well as at rest.
 Hosting, the solutions necessary to protect our
 customers' application and data assets are included       OpSource Cloud Servers and OpSource Cloud Files, our
 with the service. OpSource is guided by a                 cloud-based compute and storage services, can be
 “defense-in-depth” security strategy, in which a series   linked by OpSource Cloud Networks, our
 of security layers are implemented so that no single      customer-controlled network configuration services.
 solution is relied upon to provide security.              Rather than implementing our network security on top
                                                           of our virtualized servers, OpSource Cloud Networks is
 Secure Datacenters                                        a truly network-based implementation running within
 OpSource delivers its Cloud and Managed Hosting           our Cisco switching fabric. Customers manage and
 Solutions from top-tier colocation facilities in the      configure OpSource Cloud Networks via the web-based
 Sunnyvale, CA; Ashburn, VA; London, UK; and Paris,        OpSourceCloud.net user interface or Open API.
 France. Our facilities meet or exceed Tier III
 standards, the highest commercially available             Customer-Controlled Network Configuration
 datacenter rating as measured by the Uptime               • Configurable Layer-2 VLANs based on Cisco-based
 Institute (http://uptimeinstitute.org/). Network            switching fabric
 connectivity is provided Global Tier-1 IP Networks.       • Customizable ACL-based firewall rules allow you to
                                                             control access into each network VLAN
 • All areas within the facility are monitored 24x7x365    • NAT and VIP functions to expose your private IP
   by closed-circuit cameras and onsite guards               addresses to the public Internet
 • OpSource data center space is physically isolated       • Load-balancing and port translation across multiple
   and accessible only by OpSource administrators            virtual servers, with the ability to take servers in and
 • Access is restricted by authorized personnel through      out of service manually, programmatically, or based
   biometric two-factor authentication                       on monitoring probes
 • CCTV digital cameras cover the entire center,           • Layer 2 Multicast support for clustering
   including cages, with detailed 24x7 surveillance and      implementations
   audit logs
                                                           Encryption
 OpSource Cloud Hosting Security                           • Data stored with 256-bit encryption at rest and
 OpSource Cloud Hosting provides the security and            128-bit SSL encryption while in transit
 control enterprises demand. Unlike other commodity
 cloud services, OpSource provides an environment to       Secure Access
 configure and lock-down your compute and storage           • Access to OpSource Cloud via the Public Internet,
 environments. With Opsource Cloud Networks,                 MPLS, VPN, Carrier Ethernet or Private Networks



© 2010 OpSource, Inc. All rights reserved.                                                                    Page 1 of 2
ENTERPRISE CLOUD AND MANAGED HOSTING



 OpSource Cloud Hosting Security (cont’d)                                                  Intrusion Detection
 Role-based Administrative Control                                                         • Fully-managed Intrusion Detection System (IDS)
 • VPN administration of all servers                                                         utilizing signature, protocol and anomaly based
 • Unique username and password for multiple                                                 inspection methods
   administrators
                                                                                           Edge-to-Edge Security Visibility
 • Role-based permissions allow administrator to limit
                                                                                           • Edge-to-edge security, visibility and carrier-class
   to manage only certain resources, such as servers,
                                                                                             threat management and remediation utilizing
   storage or networks.
                                                                                             industry leading Arbor Networks Peakflow to
 Reporting                                                                                   compare real-time network traffic against baseline
 • Audit logs of all environmental changes                                                   definitions of normal network behavior, immediately
                                                                                             flagging all anomalies due to security hazards such
 Compliance                                                                                  as:
 • OpSource maintains SAS-70 attestation in
   conjunction with our auditor SAS 70 Solutions. Our                                      Denial of Service
   SAS-70 attestation is based on an in-depth series of                                    • Denial of Service (DoS) and Distributed Denial of
   documented controls covering the operational                                              Service (DDoS) attacks, worms or botnets
   management of the OpSource Cloud Hosting
                                                                                           Secure Access
   infrastructure.
                                                                                           • Access to OpSource Cloud via the Public Internet,
 24x7 Incident Response                                                                      MPLS, VPN, Carrier Ethernet or Private Networks
 • OpSource Security Incident Response Team (OSIRT)
                                                                                           SAS 70 and PCI Compliance
   to handle reports of security incidents. The OSIRT
                                                                                           • OpSource maintains SAS-70 attestation in
   will escalate the incident to law enforcement and/or
                                                                                             conjunction with our auditor SAS 70 Solutions. Our
   executive management as prescribed in security
                                                                                             SAS-70 attestation is based on an in-depth series of
   policies.
                                                                                             documented controls covering the operational
                                                                                             management of the OpSource Cloud Hosting
  OpSource Managed Hosting Security
                                                                                             infrastructure.
 With the constant threat of security breaches, having
                                                                                           • OpSource offers a PCI-compliant environment that
 a clear and robust security implementation is a
                                                                                             implements a number of security measures required
 necessity, not an option. OpSource is guided by a
                                                                                             for applications storing, transmitting, or processing
 “defense-in-depth” security strategy, in which a series
                                                                                             credit or debit card information
 of security layers are implemented so that no single
 solution is relied upon to provide security.                                              24x7 Incident Response
                                                                                           • OpSource Security Incident Response Team (OSIRT) to
 Firewall
                                                                                             handle reports of security incidents. The OSIRT will
 • Fully-managed, hardened, stateful inspection
                                                                                             escalate the incident to law enforcement and/or
   firewall technology with customized
                                                                                             executive management as prescribed in security policies.
   customer-specific firewall rules




Company                                                                                                           Corporate Headquarters
OpSource provides cloud and managed hosting solutions that enable businesses of all sizes to accelerate
                                                                                                                  5201 Great America Parkway, Suite 120
growth and scale operations while controlling costs and reducing IT infrastructure support risks. More
than four hundred Software-as-a-Service ISVs, cloud platform providers, carriers and enterprises rely on          Santa Clara, CA 95054
OpSource's expertise, experience and agility to operate high-availability, business-critical hosting              408-567-2000
environments. Our industry-leading Application Operations service goes beyond traditional hosting by
                                                                                                                  sales@OpSource.net
providing application management, change management, performance management and application
optimization. OpSource Cloud is the rst cloud to bring together the exibility, availability and
community of the public cloud with the security, performance and control the enterprise demands.
Founded in 2002, OpSource is SAS 70 Type II, PCI DSS Level 1 and European Safe Harbor certi ed and has            www.OpSource.net
operations in California, Virginia, UK, Ireland, and India.

© 2010 OpSource, Inc. All rights reserved.                                                                                                      Page 2 of 2

More Related Content

What's hot

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2Irsandi Hasan
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMBill McGee
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsAhmed Habib
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services Felipe Lamus
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER ServicesOscar Romano
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignCisco Canada
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3Irsandi Hasan
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Shamal Abeyrathne
 
Fg80 series
Fg80 seriesFg80 series
Fg80 seriespatchs
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheetdemoteam
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsAltaware, Inc.
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionAhmed Habib
 
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...Hillel Kobrovski
 
Ccna security
Ccna securityCcna security
Ccna securitydkaya
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
 

What's hot (20)

CCNA Security - Chapter 2
CCNA Security - Chapter 2CCNA Security - Chapter 2
CCNA Security - Chapter 2
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
CCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ipsCCNA Security 011- implementing ios-based ips
CCNA Security 011- implementing ios-based ips
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Hosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture DesignHosted Security as a Service - Solution Architecture Design
Hosted Security as a Service - Solution Architecture Design
 
CCNA Security - Chapter 3
CCNA Security - Chapter 3CCNA Security - Chapter 3
CCNA Security - Chapter 3
 
Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0Hillstone-Corporate-Overview-EN-V3.0
Hillstone-Corporate-Overview-EN-V3.0
 
Fg80 series
Fg80 seriesFg80 series
Fg80 series
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
FortiGate-310B Datasheet
FortiGate-310B DatasheetFortiGate-310B Datasheet
FortiGate-310B Datasheet
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
CCNA Security 03- network foundation protection
CCNA Security 03- network foundation protectionCCNA Security 03- network foundation protection
CCNA Security 03- network foundation protection
 
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
 
Ccna security
Ccna securityCcna security
Ccna security
 
1000281 en 2
1000281 en 21000281 en 2
1000281 en 2
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...
 

Similar to OpSource Enterprise-Class Security

OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hostingOpSource
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS SecurityAmazon Web Services
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...Khazret Sapenov
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services SecureADVA
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructurexKinAnx
 
Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Orgad Kimchi
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesKim Bookout
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)alwayson
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV EasyADVA
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadMehtabRohela
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data CenterCisco Russia
 

Similar to OpSource Enterprise-Class Security (20)

OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hosting
 
Apani EpiForce Security Software Brochure
Apani EpiForce Security Software BrochureApani EpiForce Security Software Brochure
Apani EpiForce Security Software Brochure
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Yes, you can be pci compliant using a public iaas cloud   a case study by phi...Yes, you can be pci compliant using a public iaas cloud   a case study by phi...
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
 
Making NFV-Based Business Services Secure
Making NFV-Based Business Services SecureMaking NFV-Based Business Services Secure
Making NFV-Based Business Services Secure
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructure
 
Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds Oracle Solaris 11 Built for Clouds
Oracle Solaris 11 Built for Clouds
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Protegendo sua cloud
Protegendo sua cloud Protegendo sua cloud
Protegendo sua cloud
 
Az Managed Exchange Services(1)
Az Managed Exchange Services(1)Az Managed Exchange Services(1)
Az Managed Exchange Services(1)
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
Making NFV Easy
Making NFV EasyMaking NFV Easy
Making NFV Easy
 
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center HyderabadCisco ASA Firewall Presentation - ZABTech center Hyderabad
Cisco ASA Firewall Presentation - ZABTech center Hyderabad
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data Center
 

More from OpSource

Customer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company ProfitabilityCustomer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company ProfitabilityOpSource
 
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud ComplexitiesHot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud ComplexitiesOpSource
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
Overview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOverview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOpSource
 
Demo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing CloudDemo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing CloudOpSource
 
Scalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept SoftwareScalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept SoftwareOpSource
 
Challenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVsChallenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVsOpSource
 
SAP Business Objects
SAP Business ObjectsSAP Business Objects
SAP Business ObjectsOpSource
 
Saas business model_thinkstrategies
Saas business model_thinkstrategiesSaas business model_thinkstrategies
Saas business model_thinkstrategiesOpSource
 
Scaling SaaS on Oracle
Scaling SaaS on OracleScaling SaaS on Oracle
Scaling SaaS on OracleOpSource
 
Create Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN ConnectionsCreate Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN ConnectionsOpSource
 
Vendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSVendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSOpSource
 
Cloud Disaster Recovery
Cloud Disaster Recovery Cloud Disaster Recovery
Cloud Disaster Recovery OpSource
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersOpSource
 
Case Study: ClearBenefits
Case Study: ClearBenefitsCase Study: ClearBenefits
Case Study: ClearBenefitsOpSource
 
Case Study: ACCEPT
Case Study: ACCEPTCase Study: ACCEPT
Case Study: ACCEPTOpSource
 
Astoria case study
Astoria case studyAstoria case study
Astoria case studyOpSource
 
Case Study: Aerohive
Case Study: AerohiveCase Study: Aerohive
Case Study: AerohiveOpSource
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryOpSource
 
Case Study: MediServe
Case Study: MediServeCase Study: MediServe
Case Study: MediServeOpSource
 

More from OpSource (20)

Customer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company ProfitabilityCustomer Success: The Key To SaaS Company Profitability
Customer Success: The Key To SaaS Company Profitability
 
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud ComplexitiesHot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
Hot Cloud Companies: Tap In Systems - The Problem: Managing Cloud Complexities
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
Overview & Demo: OpSource Cloud
Overview & Demo: OpSource CloudOverview & Demo: OpSource Cloud
Overview & Demo: OpSource Cloud
 
Demo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing CloudDemo: Easily Deploy Applications with Standing Cloud
Demo: Easily Deploy Applications with Standing Cloud
 
Scalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept SoftwareScalable & Cost Effective SaaS: Case Study: Accept Software
Scalable & Cost Effective SaaS: Case Study: Accept Software
 
Challenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVsChallenges & Solutions for SaaS ISVs
Challenges & Solutions for SaaS ISVs
 
SAP Business Objects
SAP Business ObjectsSAP Business Objects
SAP Business Objects
 
Saas business model_thinkstrategies
Saas business model_thinkstrategiesSaas business model_thinkstrategies
Saas business model_thinkstrategies
 
Scaling SaaS on Oracle
Scaling SaaS on OracleScaling SaaS on Oracle
Scaling SaaS on Oracle
 
Create Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN ConnectionsCreate Secure Site-to-Cloud VPN Connections
Create Secure Site-to-Cloud VPN Connections
 
Vendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaSVendor Landscape: Cloud IaaS
Vendor Landscape: Cloud IaaS
 
Cloud Disaster Recovery
Cloud Disaster Recovery Cloud Disaster Recovery
Cloud Disaster Recovery
 
Leaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for CustomersLeaders in the Cloud: Identifying Cloud Business Value for Customers
Leaders in the Cloud: Identifying Cloud Business Value for Customers
 
Case Study: ClearBenefits
Case Study: ClearBenefitsCase Study: ClearBenefits
Case Study: ClearBenefits
 
Case Study: ACCEPT
Case Study: ACCEPTCase Study: ACCEPT
Case Study: ACCEPT
 
Astoria case study
Astoria case studyAstoria case study
Astoria case study
 
Case Study: Aerohive
Case Study: AerohiveCase Study: Aerohive
Case Study: Aerohive
 
The Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS DeliveryThe Build vs. Buy Decision for SaaS Delivery
The Build vs. Buy Decision for SaaS Delivery
 
Case Study: MediServe
Case Study: MediServeCase Study: MediServe
Case Study: MediServe
 

OpSource Enterprise-Class Security

  • 1. ENTERPRISE CLOUD AND MANAGED HOSTING Enterprise-Class Security OpSource Security customers are able to configure VLANs between With the constant threat of security breaches, having servers, configure ACL-based firewalls, and control and a clear and robust security implementation is a track administrative usage. Data is necessity, not an option. With OpSource Managed encrypted while being transferred as well as at rest. Hosting, the solutions necessary to protect our customers' application and data assets are included OpSource Cloud Servers and OpSource Cloud Files, our with the service. OpSource is guided by a cloud-based compute and storage services, can be “defense-in-depth” security strategy, in which a series linked by OpSource Cloud Networks, our of security layers are implemented so that no single customer-controlled network configuration services. solution is relied upon to provide security. Rather than implementing our network security on top of our virtualized servers, OpSource Cloud Networks is Secure Datacenters a truly network-based implementation running within OpSource delivers its Cloud and Managed Hosting our Cisco switching fabric. Customers manage and Solutions from top-tier colocation facilities in the configure OpSource Cloud Networks via the web-based Sunnyvale, CA; Ashburn, VA; London, UK; and Paris, OpSourceCloud.net user interface or Open API. France. Our facilities meet or exceed Tier III standards, the highest commercially available Customer-Controlled Network Configuration datacenter rating as measured by the Uptime • Configurable Layer-2 VLANs based on Cisco-based Institute (http://uptimeinstitute.org/). Network switching fabric connectivity is provided Global Tier-1 IP Networks. • Customizable ACL-based firewall rules allow you to control access into each network VLAN • All areas within the facility are monitored 24x7x365 • NAT and VIP functions to expose your private IP by closed-circuit cameras and onsite guards addresses to the public Internet • OpSource data center space is physically isolated • Load-balancing and port translation across multiple and accessible only by OpSource administrators virtual servers, with the ability to take servers in and • Access is restricted by authorized personnel through out of service manually, programmatically, or based biometric two-factor authentication on monitoring probes • CCTV digital cameras cover the entire center, • Layer 2 Multicast support for clustering including cages, with detailed 24x7 surveillance and implementations audit logs Encryption OpSource Cloud Hosting Security • Data stored with 256-bit encryption at rest and OpSource Cloud Hosting provides the security and 128-bit SSL encryption while in transit control enterprises demand. Unlike other commodity cloud services, OpSource provides an environment to Secure Access configure and lock-down your compute and storage • Access to OpSource Cloud via the Public Internet, environments. With Opsource Cloud Networks, MPLS, VPN, Carrier Ethernet or Private Networks © 2010 OpSource, Inc. All rights reserved. Page 1 of 2
  • 2. ENTERPRISE CLOUD AND MANAGED HOSTING OpSource Cloud Hosting Security (cont’d) Intrusion Detection Role-based Administrative Control • Fully-managed Intrusion Detection System (IDS) • VPN administration of all servers utilizing signature, protocol and anomaly based • Unique username and password for multiple inspection methods administrators Edge-to-Edge Security Visibility • Role-based permissions allow administrator to limit • Edge-to-edge security, visibility and carrier-class to manage only certain resources, such as servers, threat management and remediation utilizing storage or networks. industry leading Arbor Networks Peakflow to Reporting compare real-time network traffic against baseline • Audit logs of all environmental changes definitions of normal network behavior, immediately flagging all anomalies due to security hazards such Compliance as: • OpSource maintains SAS-70 attestation in conjunction with our auditor SAS 70 Solutions. Our Denial of Service SAS-70 attestation is based on an in-depth series of • Denial of Service (DoS) and Distributed Denial of documented controls covering the operational Service (DDoS) attacks, worms or botnets management of the OpSource Cloud Hosting Secure Access infrastructure. • Access to OpSource Cloud via the Public Internet, 24x7 Incident Response MPLS, VPN, Carrier Ethernet or Private Networks • OpSource Security Incident Response Team (OSIRT) SAS 70 and PCI Compliance to handle reports of security incidents. The OSIRT • OpSource maintains SAS-70 attestation in will escalate the incident to law enforcement and/or conjunction with our auditor SAS 70 Solutions. Our executive management as prescribed in security SAS-70 attestation is based on an in-depth series of policies. documented controls covering the operational management of the OpSource Cloud Hosting OpSource Managed Hosting Security infrastructure. With the constant threat of security breaches, having • OpSource offers a PCI-compliant environment that a clear and robust security implementation is a implements a number of security measures required necessity, not an option. OpSource is guided by a for applications storing, transmitting, or processing “defense-in-depth” security strategy, in which a series credit or debit card information of security layers are implemented so that no single solution is relied upon to provide security. 24x7 Incident Response • OpSource Security Incident Response Team (OSIRT) to Firewall handle reports of security incidents. The OSIRT will • Fully-managed, hardened, stateful inspection escalate the incident to law enforcement and/or firewall technology with customized executive management as prescribed in security policies. customer-specific firewall rules Company Corporate Headquarters OpSource provides cloud and managed hosting solutions that enable businesses of all sizes to accelerate 5201 Great America Parkway, Suite 120 growth and scale operations while controlling costs and reducing IT infrastructure support risks. More than four hundred Software-as-a-Service ISVs, cloud platform providers, carriers and enterprises rely on Santa Clara, CA 95054 OpSource's expertise, experience and agility to operate high-availability, business-critical hosting 408-567-2000 environments. Our industry-leading Application Operations service goes beyond traditional hosting by sales@OpSource.net providing application management, change management, performance management and application optimization. OpSource Cloud is the rst cloud to bring together the exibility, availability and community of the public cloud with the security, performance and control the enterprise demands. Founded in 2002, OpSource is SAS 70 Type II, PCI DSS Level 1 and European Safe Harbor certi ed and has www.OpSource.net operations in California, Virginia, UK, Ireland, and India. © 2010 OpSource, Inc. All rights reserved. Page 2 of 2