Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Horizon Data Center Solutions: Company & Capabilities Overview Company & Capabilities Overview
<ul><li>Secure, stable and scalable   IT Infrastructure for mission critical applications. </li></ul><ul><ul><li>Infrastru...
Our Operations <ul><li>We manage  all layers  o f our infrastructure so we can ensure the quality and performance of our s...
Our Customer Experience <ul><ul><li>We understand what matters most. </li></ul></ul><ul><ul><li>Security:   in today’s wor...
Common  Challenges <ul><li>Economic uncertainty driving CIOs to halt projects, freeze hiring and pile more responsibility ...
Why Outsource IT Infrastructure? <ul><li>Strategic Gain:  </li></ul><ul><ul><li>Entrust someone else to wear the pager:  c...
Our Data Center Platform <ul><ul><li>We manage ALL layers of our infrastructure </li></ul></ul><ul><ul><ul><ul><li>Facilit...
Typical Network Topology v/s vStructure™  8 Internal Infrastructure vStructure ™  Single Firewall Compute Layer Storage La...
Security in a Multi-Tenant Environment <ul><li>We’ve built in layers of protection comprised of Network (physical and virt...
vStructure™ Solutions 10 Colocation Managed Services Virtual Machine Solutions Virtual  Resource Pool <ul><li>Web </li></u...
The Vazata Client Portal Our  Client Portal  provides real-time visibility into key performance metrics. <ul><li>Network P...
Vazata and The US Government <ul><li>Why is our relationship with the Government relevant to you?  Take a SAS70 Type II au...
In Closing... <ul><li>We resolve common challenges for our clients: </li></ul><ul><li>A Large International Restaurant Cha...
Thank you for your time today!
Upcoming SlideShare
Loading in …5
×

Vazata Federal IaaS

665 views

Published on

VAZATA Federal Infrastructure as a Service (IaaS)

  • Be the first to comment

  • Be the first to like this

Vazata Federal IaaS

  1. 1. Horizon Data Center Solutions: Company & Capabilities Overview Company & Capabilities Overview
  2. 2. <ul><li>Secure, stable and scalable IT Infrastructure for mission critical applications. </li></ul><ul><ul><li>Infrastructure-as-a-Service (IaaS) provider serving: </li></ul></ul><ul><ul><ul><ul><ul><li>Global 1000 </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>US Federal Government </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Mid-market enterprises </li></ul></ul></ul></ul></ul><ul><ul><li>Solve technology problems through purpose-built cloud architecture ( Structure™ ) </li></ul></ul><ul><ul><ul><ul><ul><li>Redundant Network Connectivity and Power Infrastructure </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Ability to Grow with Customer’s Success </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>US Federal Government Tested Data Security </li></ul></ul></ul></ul></ul><ul><ul><ul><ul><ul><li>Compelling ROI </li></ul></ul></ul></ul></ul><ul><ul><li>On June 28, 2011, became first IaaS provider to receive an Authority to Operate (ATO) under the US Government ’ s “ Cloud First ” cost savings initiative. </li></ul></ul><ul><ul><li>Completed best-in-class audits, including SAS 70 Type II (SSAE 16) and NIST 800-53 accreditation (containing over 30 times the control objectives for a typical SAS 70 Type II audit). </li></ul></ul>Our Story 2
  3. 3. Our Operations <ul><li>We manage all layers o f our infrastructure so we can ensure the quality and performance of our solutions. </li></ul><ul><li>Founded in 2000 as Mareechi and merged with Horizon Data Center Solutions in 2009 </li></ul><ul><li>Renamed company as Vazata in September, 2011 </li></ul><ul><li>We designed our infrastructure for mission critical managed hosting, cloud computing and colocation </li></ul><ul><li>We operate 3 Tier III data centers (two in Dallas, one in Northern Virginia) </li></ul><ul><li>We’ve established top-tier partnerships and invested in “best of breed” capability </li></ul>3
  4. 4. Our Customer Experience <ul><ul><li>We understand what matters most. </li></ul></ul><ul><ul><li>Security: in today’s world, CIOs face more security and compliance challenges than ever. </li></ul></ul><ul><ul><ul><ul><li>We ’ ve been accredited to provide IaaS solutions to US Federal Government branches that are hyper-sensitive to security concerns (ie: Homeland Security, US Department of Treasury, etc.). </li></ul></ul></ul></ul><ul><ul><li>Stability: disaster recovery, business continuity and availability are core to your decision. </li></ul></ul><ul><ul><ul><ul><li>Not only do we adhere to contractually defined SLAs, but we ’ re one of the few providers that actually proactively report to our clients on performance levels. </li></ul></ul></ul></ul><ul><ul><li>Scalability: it ’ s critical that you choose a partner that can adapt and scale the solution. </li></ul></ul><ul><ul><ul><ul><li>We customize solutions to your needs today and we anticipate (with you) requirements for the future. </li></ul></ul></ul></ul><ul><ul><li>Accessibility: outsourcing doesn‘t mean you have to lose control or visibility. </li></ul></ul><ul><ul><ul><ul><li>We simply provide security, stability and scalability while you maintain direct control of your IT operations. </li></ul></ul></ul></ul><ul><ul><li>Administrative Ease: engaging a technology vendor shouldn‘t be tedious. </li></ul></ul><ul><ul><ul><ul><li>We move fast and won ’ t burden your staff, budget and timeline with tedious contracting, billing and administrative hassles. </li></ul></ul></ul></ul><ul><ul><li>Fiscal Viability: the ROI has to make sense. </li></ul></ul><ul><ul><ul><ul><li>Pay for what you need, gain access to best-of-breed assets and forego cost- ineffective capital expenditures associated with building in-house. </li></ul></ul></ul></ul>4
  5. 5. Common Challenges <ul><li>Economic uncertainty driving CIOs to halt projects, freeze hiring and pile more responsibility on </li></ul><ul><li>existing IT staff </li></ul><ul><li>Focus on key applications </li></ul><ul><li>93% of SMBs that suffer significant data loss are out of business in 5 years (US Bureau of labor) </li></ul><ul><li>Outages can cost SMBs over $12,000 per day (Symantec – 2011 SMB Disaster Recovery Survey) </li></ul><ul><li>August 2011: Amazon EC2 outage takes down Foursquare, Instagram, Quora, Reddit… </li></ul><ul><li>50% of SMBs have no disaster recovery plan in place, even though 65% of them operate in areas </li></ul><ul><li>vulnerable to natural disasters. (Symantec – 2011 SMB Disaster Recovery Survey) </li></ul><ul><li>According to USA Today , security firm CardCops has been tracking a 20% year-over-year </li></ul><ul><li>increase of hackers testing batches of payment card numbers to ensure they are still active </li></ul><ul><li>Corporate governance, privacy and security issues have created an increase in regulation </li></ul><ul><li>IT management must seriously consider how corporate data is used, accessed, archived, protected </li></ul><ul><li>Increased accountability and scrutiny is being placed on corporate executives </li></ul><ul><li>“ Optional” initiatives are moving quickly to “mandatory” </li></ul><ul><li>Hardware refresh </li></ul><ul><li>Network growth and challenges </li></ul><ul><li>Specialized projects </li></ul>Compliance & Legislation Security Threats Disasters Business Continuity Increasing IT Workload Hardware Requirements 5 Licensing <ul><li>The expense and management required to maintain software licensing can burden your IT operation </li></ul><ul><li>(VMware, Microsoft…). </li></ul>
  6. 6. Why Outsource IT Infrastructure? <ul><li>Strategic Gain: </li></ul><ul><ul><li>Entrust someone else to wear the pager: count on SLAs but maintain CONTROL </li></ul></ul><ul><ul><li>Ensure high availability and audited/tested security: leverage the requirements of many </li></ul></ul><ul><ul><li>Focus on your core competencies while leveraging ours as well </li></ul></ul><ul><ul><li>Establish a clear path to upgrade: technology, people and process </li></ul></ul><ul><ul><li>Adapt and scale easily: mergers, acquisitions, geographic expansion… </li></ul></ul><ul><ul><li>Mitigate risk through multiple infrastructures: no single point of failure </li></ul></ul><ul><li>Financial Gain: </li></ul><ul><ul><li>Avoid high cost to build, maintain and predict operating expense without capital outlay (CapEx versus OpEx) </li></ul></ul><ul><ul><li>Access technical resources that are often harder to afford and retain in-house </li></ul></ul><ul><ul><li>Multiple internet providers, geo-diverse facilities, power, HVAC & fire suppression, network and computing infrastructure challenge ROI </li></ul></ul><ul><ul><li>Most data centers do not populate server racks beyond 40-60% and typical utilization rates are between 7% and 15% in a non-virtualized environment. (Gartner) </li></ul></ul><ul><ul><li>Purchase flexibility enables you to optimize the solution for today and position your company for the future </li></ul></ul><ul><ul><li>Make an apples-to-apples comparison: you can ’ t harness the power, scale and security benefits of top-tier IT infrastructure in-house without compromising ROI </li></ul></ul>6
  7. 7. Our Data Center Platform <ul><ul><li>We manage ALL layers of our infrastructure </li></ul></ul><ul><ul><ul><ul><li>Facility Layer: 3 Tier III data centers in the US </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Compute Layer: HP c-7000 blades </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Storage Layer: 3Par T800 Series </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Network Layer: Cisco ASA 5500 and Fortinet Fortigate 310B for FW/IPS/IDS and F5 IP series for network load balancing </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Virtualization Layer: VMware products including ESX and Vsphere 5.0 </li></ul></ul></ul></ul><ul><ul><li>Our platform is purpose-built </li></ul></ul><ul><ul><ul><ul><li>Multiple data centers with private DWDM fiber connectivity </li></ul></ul></ul></ul><ul><ul><ul><ul><li>SAS 70 Type II (SSAE 16), FISMA compliant, LEED certified data centers </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Data replication between facilities for DR/Back-up </li></ul></ul></ul></ul>7 VAZATA IaaS Multi-Site Design
  8. 8. Typical Network Topology v/s vStructure™ 8 Internal Infrastructure vStructure ™ Single Firewall Compute Layer Storage Layer Cisco ASA 5500 Series Firewall F5 Load Balancer Enterprise Class Virtualization Compute Layer Storage Layer
  9. 9. Security in a Multi-Tenant Environment <ul><li>We’ve built in layers of protection comprised of Network (physical and virtual), VMware and administrative security: </li></ul><ul><ul><li>Host Hardening: all hosts are “locked down” per VMware best practices </li></ul></ul><ul><ul><li>Security Testing: regular vulnerability scanning and penetration testing via 3 rd party auditors </li></ul></ul><ul><ul><li>Network Segmentation: we segment customer configurations and traffic by locking down Layer 2’s physical and virtual network </li></ul></ul>9 <ul><li>VMware technologies create logical security boundaries that provide isolation: </li></ul><ul><ul><li>Role based access control provides a clear separation of workflow for Virtual Infrastructure and security administrators </li></ul></ul><ul><ul><li>Secure Applications and virtual machines with adaptive trust zones </li></ul></ul><ul><ul><li>Continuous assessment of IT compliance state and automated remediation </li></ul></ul>
  10. 10. vStructure™ Solutions 10 Colocation Managed Services Virtual Machine Solutions Virtual Resource Pool <ul><li>Web </li></ul><ul><li>Includes: </li></ul><ul><li>1Mbs/Second Max </li></ul><ul><li>Operating System </li></ul><ul><li>vStructure Firewall </li></ul><ul><li>vStructure Switching </li></ul><ul><li>1 vCPU </li></ul><ul><li>4GB RAM </li></ul><ul><li>100GB HD </li></ul><ul><li>App </li></ul><ul><li>Includes: </li></ul><ul><li>1Mbs/Second Max </li></ul><ul><li>Operating System </li></ul><ul><li>vStructure Firewall </li></ul><ul><li>vStructure Switching </li></ul><ul><li>1 vCPU </li></ul><ul><li>8GB RAM </li></ul><ul><li>250GB HD </li></ul><ul><li>Optional Add Ons: </li></ul><ul><li>SAN Services </li></ul>Cage: Custom Quote Public/Private Networks: Custom Quote <ul><li>Enterprise </li></ul><ul><li>Includes: </li></ul><ul><li>3Mbs/Second Max </li></ul><ul><li>Operating System </li></ul><ul><li>vStructure Firewall </li></ul><ul><li>vStructure Switching </li></ul><ul><li>2 vCPUs </li></ul><ul><li>16GB RAM </li></ul><ul><li>500GB HD </li></ul><ul><li>Basic Care </li></ul><ul><li>24/7/365 Help Desk </li></ul><ul><li>Basic Monitoring </li></ul><ul><li>VM Management </li></ul><ul><li>Optional Add Ons: </li></ul><ul><li>SAN Services </li></ul><ul><li>Additional vCPU </li></ul><ul><li>Additional RAM </li></ul><ul><li>Additional HD </li></ul><ul><li>Advanced Care </li></ul>We’re Taking Colo to the Cloud. <ul><li>Services </li></ul><ul><li>Managed Services: </li></ul><ul><li>Multi-Tenant, Private, </li></ul><ul><li>or Hybrid Cloud </li></ul><ul><li>Full Infrastructure </li></ul><ul><li>Management </li></ul><ul><li>Network Services </li></ul><ul><li>Backup & DR Policies </li></ul><ul><li>SAN Services </li></ul><ul><li>Included: </li></ul><ul><li>Fully Managed </li></ul><ul><li>Monitoring & Help </li></ul><ul><li>Desk Support </li></ul><ul><li>Colo </li></ul><ul><li>Virtual Resources: </li></ul><ul><li>vCPU </li></ul><ul><li>RAM </li></ul><ul><li>HD </li></ul><ul><li>Network Services </li></ul><ul><li>Vazata Services </li></ul>
  11. 11. The Vazata Client Portal Our Client Portal provides real-time visibility into key performance metrics. <ul><li>Network Performance Monitoring: </li></ul><ul><li> Availability monitoring </li></ul><ul><li> Uptime monitoring </li></ul><ul><li> Network device health monitoring (firewall, </li></ul><ul><li>router, switch) </li></ul><ul><li> Network mapping </li></ul><ul><li> Network traffic analysis </li></ul><ul><li> Network configuration management </li></ul><ul><li>Application Performance Monitoring: </li></ul><ul><li> Active directory monitoring </li></ul><ul><li> SQL server monitoring </li></ul><ul><li> Exchange server monitoring </li></ul><ul><li> Service monitoring </li></ul><ul><li> Windows service monitoring </li></ul><ul><li> Process monitoring </li></ul><ul><li> Website monitoring </li></ul><ul><li>Server Performance Monitoring: </li></ul><ul><li> Server monitoring (Windows, Linux, Unix) </li></ul><ul><li> VMware monitoring </li></ul><ul><li> System health monitoring (CPU, memory, </li></ul><ul><li>disk, hardware health) </li></ul><ul><li> Custom WMI/SNMP monitoring </li></ul><ul><li>Network Fault Management: </li></ul><ul><li>Email alert fault notification </li></ul><ul><li>SMS alert fault notification </li></ul><ul><li>Network monitoring tools (Real time graphing, Switch port mapper, Connect from anywhere, SNMP MIB browser) </li></ul><ul><li>Windows event Log monitoring </li></ul><ul><li>Syslog monitoring & SNMP trap processing </li></ul><ul><li>Threshold based alerting </li></ul><ul><li>Trigger self-healing scripts or patches </li></ul><ul><li>Integration with help desk </li></ul><ul><li>Advanced alert management (configure device dependency, downtime scheduler, alarm suppression/escalation, web alerts) </li></ul><ul><li>Customizable dashboards </li></ul><ul><li>Service level management dashboards (managers dashboard) </li></ul><ul><li>Network performance reporting (Top N reports, business snapshot based reports, scheduled emailing of periodic reports) </li></ul>11
  12. 12. Vazata and The US Government <ul><li>Why is our relationship with the Government relevant to you? Take a SAS70 Type II audit and pump it full of steroids... </li></ul><ul><ul><li>In October, 2010, we were one of 12 companies awarded a Blanket Purchase Agreement (BPA) from the US General Services Administration (GSA) for IaaS to provide cloud services </li></ul></ul><ul><ul><li>After 8-months of intensive US Government auditing of our infrastructure and delivery, we became the 1st provider to be awarded an Authority to Operate (ATO) </li></ul></ul><ul><ul><li>A standard SAS 70 Type II audit contains 25-30 control points whereas the ATO assesses and accredits 750+ control points for each “lot” – Cloud Storage, Virtual Machines and Cloud Web Hosting </li></ul></ul><ul><ul><li>Our extensive list of compliance achievements creates leverage for customers (FISMA, DIACAP, PCI, NIST 800-53, SSAE 16 Type II…) </li></ul></ul><ul><ul><li>We’ve achieved its SSAE 16 Type II for all 3 facilities </li></ul></ul><ul><li>  </li></ul>Management Controls: Assessment & Authorization Planning Risk Assessment System & Services Acquisition Operational Controls: Awareness & Training Configuration Management Contingency Planning Incident Response Maintenance Media Prevention Physical & Environmental Protection Personnel Security System & Information Integrity Technical Controls: Access Control Audit & Accountability Identification & Authentication System & Communications Protection 12
  13. 13. In Closing... <ul><li>We resolve common challenges for our clients: </li></ul><ul><li>A Large International Restaurant Chain had audit compliance pains; didn’t have a working DR policy </li></ul><ul><ul><li>Needed a backup solution for 35TB of Storage </li></ul></ul><ul><ul><li>We beat an internally proposed solution that was > 50% more expensive </li></ul></ul><ul><ul><li>Corporate mandate required DR policy </li></ul></ul><ul><ul><li>We provide seamless backup & replication of their corporate server farm in 2 geographically disperse locations </li></ul></ul><ul><li>Department of Defense </li></ul><ul><ul><li>DoD needed secure environment under the DoD security measures </li></ul></ul><ul><ul><li>Thousands of hits per day </li></ul></ul><ul><ul><li>Required ability to scale on demand </li></ul></ul><ul><ul><li>Need stable platform to scale to meet needs of overseas troops </li></ul></ul><ul><li>SaaS Provider to Cell Phone Users </li></ul><ul><ul><li>Was approaching end of life of hardware </li></ul></ul><ul><ul><li>Did not have a test and development environment </li></ul></ul><ul><ul><li>Requires secure, stable environment </li></ul></ul><ul><ul><li>Requires ability to scale in support of growth of their customers </li></ul></ul><ul><li>  </li></ul>13
  14. 14. Thank you for your time today!

×