SlideShare a Scribd company logo
1 of 2
Download to read offline
Contact Us
Network and Server Security                                                                                             1-866-398-7638
                                                                                                                          214-442-0602
SoftLayer Technologies®                                                                                                  softlayer.com




     What It Is

SoftLayer® provides security software and hardware solutions that protect our data center and our customers’ servers at both
the network and system levels. Our strategic partnerships with industry-leading companies including McAfee®, Cisco™, and Fortinet™
let us offer customers the latest solutions—many at no extra charge—helping to maximize uptime and mitigate business risk.
In addition, as with all of our offerings, SoftLayer simplifies deploying and managing these security solutions, helping to reduce the
cost, time, and skill it takes to maintain enterprise-class protection.




     Key Features and Benefits

Exceptional Standard Security Products and Services We provide the most comprehensive set of included security features
along with a wide selection of upgrade options, allowing customers to tailor their individual protection profile.

Latest Security Technologies We partner with industry-leading security vendors to offer the most comprehensive and most
advanced security available.

Unique, Highly Secure Network Design Our revolutionary Network-Within-a-Network topology provides true out-of-band
management for full remote access with no exposure to external threats.

Network and Server Level Protection Our security strategy includes hardware and software solutions at both the network and
server levels to provide overlapping layers of security.




     Network Security Features

SoftLayer’s innovative network architecture and our commitment to using the most advanced hardware technologies minimize
data center and server exposure.

Network-Within-a-Network Topology The SoftLayer network integrates three distinct and redundant network architectures
into the industry’s first Network-Within-a-Network topology. Systems are fully accessible to remote administrators but safely
off-limits from others.

■   Public Network Handles public traffic to hosted web sites or online resources. Features multi-homed connectivity to the
    Internet with bandwidth from multiple, independent carriers.

■   Private Network Allows for true out-of-band management through a distinct stand-alone third carrier over SSL, PPTP,
    or IPSEC VPN gateways.

■   Data Center to Data Center Network Provides free, secure connectivity between servers housed in separate SoftLayer facilities.




© 2009 SoftLayer Technologies, Inc.   09SLT021   rev120109
Contact Us
                                                                                                                        1-866-398-7638
                                                                                                                          214-442-0602
                                                                                                                         softlayer.com



     Server-Level Security Features

SoftLayer offers a comprehensive set of security features that are standard with every server, as well as a range of upgrade options
for nominal additional prices.

Protection and Assessment Our complete selection of protection and assessment options include Nessus® Vulnerability Assessment
and Reporting at no charge. Customers can also upgrade to McAfee Host Intrusion Protection with Reporting for even more control
over their server environments, providing full white-listing and black-listing monitoring of applications.

Hardware Firewalls SoftLayer’s hardware firewall solution provides an additional layer of server security that can be provisioned
on demand without service interruptions. 10, 100, and 1000Mbps hardware firewalls are available and fully managed through the
Customer Portal.

Anti-Virus and Anti-Spyware Protection McAfee security products add an additional layer of security. McAfee LinuxShield and
Windows® VirusScan Anti-Virus protection can be added at no charge. McAfee Total Protection is available for protection against
Viruses and Spyware.

McAfee PCI Compliance Scanning and Certification SoftLayer and McAfee have partnered to offer all SoftLayer customers
McAfee’s comprehensive Payment Card Industry (PCI) security compliance scanning service at no cost. The service scans and certifies
e-commerce sites for compliance with the PCI Security Standards Council’s Payment Card Industry Data Security Standard (PCI DSS)
version 1.1. Its value-adding features include:

■   Scheduled quarterly and unlimited manual scans
■   Certified Information Systems Security Professional (CISSP) vulnerability remediation support
■   Online self-assessment questionnaire assistance
■   Online assistance for preparing a required PCI security policy
■   Unlimited telephone technical support
■   Direct submission of compliance reports to banks
■   Full-service program starting at 6 IP addresses
■   A compliance certification report accepted by credit card companies and banks




     Contact SoftLayer

For more information on SoftLayer and any of our products, contact one of our technically trained sales staff by phone, email, or live
chat via our site.

Toll-free   1-866-398-7638
Local       214 - 442-0602
Email       sales@softlayer.com
Online      www.softlayer.com




© 2009 SoftLayer Technologies, Inc.   09SLT021   rev120109

More Related Content

Viewers also liked

EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012
EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012
EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012Marcellus Drilling News
 
A Comparison Of Literacy Rates
A  Comparison Of  Literacy  RatesA  Comparison Of  Literacy  Rates
A Comparison Of Literacy RatesJennifer Krupala
 
NY Court of Appeals Motion to Accept Town of Middlefield Ban Case
NY Court of Appeals Motion to Accept Town of Middlefield Ban CaseNY Court of Appeals Motion to Accept Town of Middlefield Ban Case
NY Court of Appeals Motion to Accept Town of Middlefield Ban CaseMarcellus Drilling News
 
Summary of Lawsuit Against Sidney, NY over Fracking Moratorium
Summary of Lawsuit Against Sidney, NY over Fracking MoratoriumSummary of Lawsuit Against Sidney, NY over Fracking Moratorium
Summary of Lawsuit Against Sidney, NY over Fracking MoratoriumMarcellus Drilling News
 
EIA: Short-Term Energy and Winter Fuels Outlook
EIA: Short-Term Energy and Winter Fuels OutlookEIA: Short-Term Energy and Winter Fuels Outlook
EIA: Short-Term Energy and Winter Fuels OutlookMarcellus Drilling News
 
Cinemonde Soiree Five
Cinemonde Soiree FiveCinemonde Soiree Five
Cinemonde Soiree FiveJerryRudes
 
Letter from Eco-Groups Shunning the Environmental Defense Fund
Letter from Eco-Groups Shunning the Environmental Defense FundLetter from Eco-Groups Shunning the Environmental Defense Fund
Letter from Eco-Groups Shunning the Environmental Defense FundMarcellus Drilling News
 
PennFuture Lawsuit Against Ultra Resources Alleging Air Pollution
PennFuture Lawsuit Against Ultra Resources Alleging Air PollutionPennFuture Lawsuit Against Ultra Resources Alleging Air Pollution
PennFuture Lawsuit Against Ultra Resources Alleging Air PollutionMarcellus Drilling News
 
Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950
Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950
Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950Marcellus Drilling News
 
A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...
A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...
A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...Marcellus Drilling News
 

Viewers also liked (15)

Kevin B
Kevin BKevin B
Kevin B
 
EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012
EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012
EIA Administrator Adam Sieminski Testimony before Congress Aug 2, 2012
 
A Comparison Of Literacy Rates
A  Comparison Of  Literacy  RatesA  Comparison Of  Literacy  Rates
A Comparison Of Literacy Rates
 
NY Court of Appeals Motion to Accept Town of Middlefield Ban Case
NY Court of Appeals Motion to Accept Town of Middlefield Ban CaseNY Court of Appeals Motion to Accept Town of Middlefield Ban Case
NY Court of Appeals Motion to Accept Town of Middlefield Ban Case
 
Summary of Lawsuit Against Sidney, NY over Fracking Moratorium
Summary of Lawsuit Against Sidney, NY over Fracking MoratoriumSummary of Lawsuit Against Sidney, NY over Fracking Moratorium
Summary of Lawsuit Against Sidney, NY over Fracking Moratorium
 
EIA: Short-Term Energy and Winter Fuels Outlook
EIA: Short-Term Energy and Winter Fuels OutlookEIA: Short-Term Energy and Winter Fuels Outlook
EIA: Short-Term Energy and Winter Fuels Outlook
 
Cinemonde Soiree Five
Cinemonde Soiree FiveCinemonde Soiree Five
Cinemonde Soiree Five
 
Letter from Eco-Groups Shunning the Environmental Defense Fund
Letter from Eco-Groups Shunning the Environmental Defense FundLetter from Eco-Groups Shunning the Environmental Defense Fund
Letter from Eco-Groups Shunning the Environmental Defense Fund
 
Fa Qs Sas70
Fa Qs Sas70Fa Qs Sas70
Fa Qs Sas70
 
Fantaseer
FantaseerFantaseer
Fantaseer
 
PennFuture Lawsuit Against Ultra Resources Alleging Air Pollution
PennFuture Lawsuit Against Ultra Resources Alleging Air PollutionPennFuture Lawsuit Against Ultra Resources Alleging Air Pollution
PennFuture Lawsuit Against Ultra Resources Alleging Air Pollution
 
Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950
Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950
Detailed Summary of New Pennsylvania Marcellus Shale Drilling Law HB1950
 
Soft Layer Fact Sheet
Soft Layer Fact SheetSoft Layer Fact Sheet
Soft Layer Fact Sheet
 
Ebteda
EbtedaEbteda
Ebteda
 
A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...
A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...
A Preliminary Examination of Marcellus Shale Drilling Activity and Crime Tren...
 

More from SoftLayer Technologies

SoftLayer Overview - April 2012 - Tokyo
SoftLayer Overview - April 2012 - TokyoSoftLayer Overview - April 2012 - Tokyo
SoftLayer Overview - April 2012 - TokyoSoftLayer Technologies
 
Parallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby KeynoteParallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby KeynoteSoftLayer Technologies
 
Lance Crosby Keynote given at Parallels Summit in Feb 2011
Lance Crosby Keynote given at Parallels Summit in Feb 2011Lance Crosby Keynote given at Parallels Summit in Feb 2011
Lance Crosby Keynote given at Parallels Summit in Feb 2011SoftLayer Technologies
 
SoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinal
SoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinalSoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinal
SoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinalSoftLayer Technologies
 
Softlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforceSoftlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforceSoftLayer Technologies
 
SoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 FinalSoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 FinalSoftLayer Technologies
 
Soft Layer Cloud Layer Overview For Slide Share
Soft Layer Cloud Layer Overview For Slide ShareSoft Layer Cloud Layer Overview For Slide Share
Soft Layer Cloud Layer Overview For Slide ShareSoftLayer Technologies
 

More from SoftLayer Technologies (20)

SoftLayer Overview - April 2012 - Tokyo
SoftLayer Overview - April 2012 - TokyoSoftLayer Overview - April 2012 - Tokyo
SoftLayer Overview - April 2012 - Tokyo
 
Parallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby KeynoteParallels APAC Summit 2011 Lance Crosby Keynote
Parallels APAC Summit 2011 Lance Crosby Keynote
 
Lance Crosby Keynote given at Parallels Summit in Feb 2011
Lance Crosby Keynote given at Parallels Summit in Feb 2011Lance Crosby Keynote given at Parallels Summit in Feb 2011
Lance Crosby Keynote given at Parallels Summit in Feb 2011
 
SoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinal
SoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinalSoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinal
SoftLayer Presentation at Stifel Nicolaus Event Feb 10 2011 vfinal
 
Softlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforceSoftlayer Technologies texasipv6taskforce
Softlayer Technologies texasipv6taskforce
 
Build Your Own Cloud (BYOC) FAQ
Build Your Own Cloud (BYOC) FAQBuild Your Own Cloud (BYOC) FAQ
Build Your Own Cloud (BYOC) FAQ
 
SoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 FinalSoftLayer overview for Telx CBX Jun10 Final
SoftLayer overview for Telx CBX Jun10 Final
 
Glue conference DJ Harris - SoftLayer
Glue conference   DJ Harris - SoftLayerGlue conference   DJ Harris - SoftLayer
Glue conference DJ Harris - SoftLayer
 
SL Services
SL ServicesSL Services
SL Services
 
SoftLayer Company Overview
SoftLayer Company OverviewSoftLayer Company Overview
SoftLayer Company Overview
 
Soft Layer Cloud Layer Overview For Slide Share
Soft Layer Cloud Layer Overview For Slide ShareSoft Layer Cloud Layer Overview For Slide Share
Soft Layer Cloud Layer Overview For Slide Share
 
Sl Adaptec
Sl AdaptecSl Adaptec
Sl Adaptec
 
Ss Mid Phase
Ss Mid PhaseSs Mid Phase
Ss Mid Phase
 
Ss Mmo Guildsites
Ss Mmo GuildsitesSs Mmo Guildsites
Ss Mmo Guildsites
 
Soft Layer Welcome
Soft Layer WelcomeSoft Layer Welcome
Soft Layer Welcome
 
Soft Layer Q109 Media Kit
Soft Layer Q109 Media KitSoft Layer Q109 Media Kit
Soft Layer Q109 Media Kit
 
Ps Support
Ps SupportPs Support
Ps Support
 
Ps Services
Ps ServicesPs Services
Ps Services
 
Ps Network
Ps NetworkPs Network
Ps Network
 
Ps Data Center Wdc
Ps Data Center WdcPs Data Center Wdc
Ps Data Center Wdc
 

Recently uploaded

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?Paolo Missier
 

Recently uploaded (20)

AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 

Ps Security

  • 1. Contact Us Network and Server Security 1-866-398-7638 214-442-0602 SoftLayer Technologies® softlayer.com What It Is SoftLayer® provides security software and hardware solutions that protect our data center and our customers’ servers at both the network and system levels. Our strategic partnerships with industry-leading companies including McAfee®, Cisco™, and Fortinet™ let us offer customers the latest solutions—many at no extra charge—helping to maximize uptime and mitigate business risk. In addition, as with all of our offerings, SoftLayer simplifies deploying and managing these security solutions, helping to reduce the cost, time, and skill it takes to maintain enterprise-class protection. Key Features and Benefits Exceptional Standard Security Products and Services We provide the most comprehensive set of included security features along with a wide selection of upgrade options, allowing customers to tailor their individual protection profile. Latest Security Technologies We partner with industry-leading security vendors to offer the most comprehensive and most advanced security available. Unique, Highly Secure Network Design Our revolutionary Network-Within-a-Network topology provides true out-of-band management for full remote access with no exposure to external threats. Network and Server Level Protection Our security strategy includes hardware and software solutions at both the network and server levels to provide overlapping layers of security. Network Security Features SoftLayer’s innovative network architecture and our commitment to using the most advanced hardware technologies minimize data center and server exposure. Network-Within-a-Network Topology The SoftLayer network integrates three distinct and redundant network architectures into the industry’s first Network-Within-a-Network topology. Systems are fully accessible to remote administrators but safely off-limits from others. ■ Public Network Handles public traffic to hosted web sites or online resources. Features multi-homed connectivity to the Internet with bandwidth from multiple, independent carriers. ■ Private Network Allows for true out-of-band management through a distinct stand-alone third carrier over SSL, PPTP, or IPSEC VPN gateways. ■ Data Center to Data Center Network Provides free, secure connectivity between servers housed in separate SoftLayer facilities. © 2009 SoftLayer Technologies, Inc. 09SLT021 rev120109
  • 2. Contact Us 1-866-398-7638 214-442-0602 softlayer.com Server-Level Security Features SoftLayer offers a comprehensive set of security features that are standard with every server, as well as a range of upgrade options for nominal additional prices. Protection and Assessment Our complete selection of protection and assessment options include Nessus® Vulnerability Assessment and Reporting at no charge. Customers can also upgrade to McAfee Host Intrusion Protection with Reporting for even more control over their server environments, providing full white-listing and black-listing monitoring of applications. Hardware Firewalls SoftLayer’s hardware firewall solution provides an additional layer of server security that can be provisioned on demand without service interruptions. 10, 100, and 1000Mbps hardware firewalls are available and fully managed through the Customer Portal. Anti-Virus and Anti-Spyware Protection McAfee security products add an additional layer of security. McAfee LinuxShield and Windows® VirusScan Anti-Virus protection can be added at no charge. McAfee Total Protection is available for protection against Viruses and Spyware. McAfee PCI Compliance Scanning and Certification SoftLayer and McAfee have partnered to offer all SoftLayer customers McAfee’s comprehensive Payment Card Industry (PCI) security compliance scanning service at no cost. The service scans and certifies e-commerce sites for compliance with the PCI Security Standards Council’s Payment Card Industry Data Security Standard (PCI DSS) version 1.1. Its value-adding features include: ■ Scheduled quarterly and unlimited manual scans ■ Certified Information Systems Security Professional (CISSP) vulnerability remediation support ■ Online self-assessment questionnaire assistance ■ Online assistance for preparing a required PCI security policy ■ Unlimited telephone technical support ■ Direct submission of compliance reports to banks ■ Full-service program starting at 6 IP addresses ■ A compliance certification report accepted by credit card companies and banks Contact SoftLayer For more information on SoftLayer and any of our products, contact one of our technically trained sales staff by phone, email, or live chat via our site. Toll-free 1-866-398-7638 Local 214 - 442-0602 Email sales@softlayer.com Online www.softlayer.com © 2009 SoftLayer Technologies, Inc. 09SLT021 rev120109