SlideShare a Scribd company logo
1 of 4
Download to read offline
EXELANZ
www.exelanz.com
Security in Joyent Cloud
1
SecurityinJoyentCloud
Security in Joyent Cloud
Majority of business IT professionals are familiar with the benefits of cloud computing. However owing to
security vulnerabilities in cloud computing infrastructures, many are yet to explore the prospective of using
public or private cloud computing in their businesses. Joyent Smart Technology solutions improve cloud
security as compared to traditional techniques.
Let’s take a look at some of the unique features of Joyent Smart Technology.
Joyent Security Approach: Secure Services
Joyent completely supports industry standards and the best practices in cloud and network infrastructure
security. It has developed and deployed an architecture that offers security to its public and private cloud
customers. Joyent’s Smart Technologies architecture offers greater flexibility and scalability to its
customers while its unique security framework provides broader and deeper protections to customer data
and applications.
Joyent SmartOS: Hardened Kernel
Joyent SmartOS is a solid, hardened foundation for applications and is an integral part of Joyent Smart
Technologies architecture. It has a tightly secured layer between applications and the underlying hardware
and OS. Joyent SmartOS integrates with its Smart DataCenter management and SmartPlatform
development environment.
SmartMachine Security
Joyent SmartOS offers and allocates CPU, memory, disk and network I/O for customers to run their
applications with SmartMachines like other virtual operating systems. What makes Joyent different and
better is that Joyent SmartMachines offer virtual computing resources within individual containers. Thus
the virtual memory and disk are completely separated resulting in better customization, scaling virtual
resources for customer, greater control and security.
2
SecurityinJoyentCloud
Resource Pool
Physical Hardware
Joyent SmartOS
Operating System and Virtualization Layer
Application Application Application
Joyent is an ideal option for clients with variable demands for CPU. It controls the costs of CPU memory
and server storage space and provides customers with idle CPU that would otherwise go unused, without
any financial burden.
Smart Security for Traditional Virtual Machines
Joyent SmartOS has similar smart security characteristics as traditional virtual machines like VMware and
XEN when they run on Joyent cloud. Joyent supports systems tightly coupled to legacy operating systems
like Windows or Linux and enables the best practices for security and performance. Clients with packaged
applications that are not tightly coupled with Windows or Linux can also run those applications on top of
Joyent SmartMachines for greater security, performance and scalability.
Smart DataCenter Security
Joyent Smart DataCenter supports dynamic VLANs and enables Joyent cloud administrators to segment
multi-tenant customers from one another at any time. For greater security flexibility, customers can
request multiple layers of security within their own secure LAN segment. The management of Joyent cloud
resources is through centralized operating system so control and security is streamlined and simplified.
SmartOS does not allow ring 0 or kernel access from management facilities or persistent resources with
SmartMachines thus reducing the risk of multiple threats to kernel.
Joyent Cloud Adds Complete Control
3
SecurityinJoyentCloud
Joyent SmartMachines running on Joyent SmartPlatform and management tools powered by Joyent
SmartDataCenter are available on dedicated core network routers, switches and firewalls. Customers can
access them in locked cages with support and software patch. You can also change management services
provided to you after quality assurance testing is performed by your resources and /or by Joyent as per
your service level objectives. Thus customers have control over the entire cloud environment starting from
hardware, network components to other physical resources through software, applications and user.
Joyent Virtual Private or Hybrid Solution
Building and hosting a cloud is expensive and complicated. Joyent takes care of that headache and offers
virtual private cloud solutions to its customers. Joyent virtual private cloud is a hybrid of public and private
infrastructures that enables companies to utilize Joyent’s data center expertise and experience. Each virtual
private cloud is hosted in one of Joyent’s data centers but is partitioned from network or storage resources
of other companies. Therefore companies decrease the capital hardware expenses and save on network
operating expenses enjoying the securities of a completely private cloud.
Using Smart Technologies for Improved Security
Joyent’s Smart Technologies can be used in public, private and virtual private clouds with the option to add
an additional layer of security to network applications. Its data center and operating system kernel offer
scalable, flexible, and secure cloud infrastructure. Customers can utilize Joyent’s multi-layered security to
partition their cloud into multiple, secure units, facilitating separate workgroups.
Joyent Smart Technologies are available through public lease of its cloud facilities. Private cloud licensing is
also available and includes installation and configuration at customer side. Joyent also provides cost-
effective and completely segmented virtual private cloud resources at any of its 5 data centers. While Joyent
is focused on delivering a flawless infrastructure to run your application, top quality engineers at Exelanz
work to bring that awesome technology and power of cloud closer to your business. Exelanz offers
comprehensive consulting around Joyent's cloud products and due to this close association, engineers are
able to extract the efficiency of Joyent cloud's powers making your applications reliable and cost-effective.
Contact Us:
Exelanz, 103 Patroon Drive, Albany, NY 12084
Email: joyent@exelanz.com, Phone: (860) 677-8883, Skype: dasanshuman

More Related Content

Recently uploaded

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Security in joyent cloud

  • 2. 1 SecurityinJoyentCloud Security in Joyent Cloud Majority of business IT professionals are familiar with the benefits of cloud computing. However owing to security vulnerabilities in cloud computing infrastructures, many are yet to explore the prospective of using public or private cloud computing in their businesses. Joyent Smart Technology solutions improve cloud security as compared to traditional techniques. Let’s take a look at some of the unique features of Joyent Smart Technology. Joyent Security Approach: Secure Services Joyent completely supports industry standards and the best practices in cloud and network infrastructure security. It has developed and deployed an architecture that offers security to its public and private cloud customers. Joyent’s Smart Technologies architecture offers greater flexibility and scalability to its customers while its unique security framework provides broader and deeper protections to customer data and applications. Joyent SmartOS: Hardened Kernel Joyent SmartOS is a solid, hardened foundation for applications and is an integral part of Joyent Smart Technologies architecture. It has a tightly secured layer between applications and the underlying hardware and OS. Joyent SmartOS integrates with its Smart DataCenter management and SmartPlatform development environment. SmartMachine Security Joyent SmartOS offers and allocates CPU, memory, disk and network I/O for customers to run their applications with SmartMachines like other virtual operating systems. What makes Joyent different and better is that Joyent SmartMachines offer virtual computing resources within individual containers. Thus the virtual memory and disk are completely separated resulting in better customization, scaling virtual resources for customer, greater control and security.
  • 3. 2 SecurityinJoyentCloud Resource Pool Physical Hardware Joyent SmartOS Operating System and Virtualization Layer Application Application Application Joyent is an ideal option for clients with variable demands for CPU. It controls the costs of CPU memory and server storage space and provides customers with idle CPU that would otherwise go unused, without any financial burden. Smart Security for Traditional Virtual Machines Joyent SmartOS has similar smart security characteristics as traditional virtual machines like VMware and XEN when they run on Joyent cloud. Joyent supports systems tightly coupled to legacy operating systems like Windows or Linux and enables the best practices for security and performance. Clients with packaged applications that are not tightly coupled with Windows or Linux can also run those applications on top of Joyent SmartMachines for greater security, performance and scalability. Smart DataCenter Security Joyent Smart DataCenter supports dynamic VLANs and enables Joyent cloud administrators to segment multi-tenant customers from one another at any time. For greater security flexibility, customers can request multiple layers of security within their own secure LAN segment. The management of Joyent cloud resources is through centralized operating system so control and security is streamlined and simplified. SmartOS does not allow ring 0 or kernel access from management facilities or persistent resources with SmartMachines thus reducing the risk of multiple threats to kernel. Joyent Cloud Adds Complete Control
  • 4. 3 SecurityinJoyentCloud Joyent SmartMachines running on Joyent SmartPlatform and management tools powered by Joyent SmartDataCenter are available on dedicated core network routers, switches and firewalls. Customers can access them in locked cages with support and software patch. You can also change management services provided to you after quality assurance testing is performed by your resources and /or by Joyent as per your service level objectives. Thus customers have control over the entire cloud environment starting from hardware, network components to other physical resources through software, applications and user. Joyent Virtual Private or Hybrid Solution Building and hosting a cloud is expensive and complicated. Joyent takes care of that headache and offers virtual private cloud solutions to its customers. Joyent virtual private cloud is a hybrid of public and private infrastructures that enables companies to utilize Joyent’s data center expertise and experience. Each virtual private cloud is hosted in one of Joyent’s data centers but is partitioned from network or storage resources of other companies. Therefore companies decrease the capital hardware expenses and save on network operating expenses enjoying the securities of a completely private cloud. Using Smart Technologies for Improved Security Joyent’s Smart Technologies can be used in public, private and virtual private clouds with the option to add an additional layer of security to network applications. Its data center and operating system kernel offer scalable, flexible, and secure cloud infrastructure. Customers can utilize Joyent’s multi-layered security to partition their cloud into multiple, secure units, facilitating separate workgroups. Joyent Smart Technologies are available through public lease of its cloud facilities. Private cloud licensing is also available and includes installation and configuration at customer side. Joyent also provides cost- effective and completely segmented virtual private cloud resources at any of its 5 data centers. While Joyent is focused on delivering a flawless infrastructure to run your application, top quality engineers at Exelanz work to bring that awesome technology and power of cloud closer to your business. Exelanz offers comprehensive consulting around Joyent's cloud products and due to this close association, engineers are able to extract the efficiency of Joyent cloud's powers making your applications reliable and cost-effective. Contact Us: Exelanz, 103 Patroon Drive, Albany, NY 12084 Email: joyent@exelanz.com, Phone: (860) 677-8883, Skype: dasanshuman