SlideShare a Scribd company logo
1 of 2
Download to read offline
Business Recovery Center
1259 Route 46 East; Suite 105
Parsippany, NJ 07054
973 299 0302 x136
What is a Private Cloud?
A private cloud is a specific model of cloud
computing that involves a distinct and secure cloud
based environment in which only the individual
client can operate. As with other cloud models,
private clouds will provide computing power as a
service within a virtualized environment using an
underlying pool of physical computing resource e.g.
servers supporting the clients various applications.
However, under the private cloud model, the cloud
(the pool of resource) is only accessible by a single
organization providing that organization with
greater control and privacy..
Why Does My Company Need It?
The private cloud model is closer to the more
traditional model of individual local access
networks (LANs) used in the past by
enterprise but with the added advantages of
virtualization. The features and benefits of
private clouds therefore are:
Higher security and privacy;
•  techniques such as dedicated pools of resources with
access restricted to connections made from behind the
organization's firewall, dedicated leased lines and/or on-
site internal hosting ensure that operations are kept from
prying eyes
More control;
•  a private cloud is only accessible by a single organization,
that organization will have the ability to configure and
manage it online achieving a tailored network solution
Cost and energy efficiency;
•  implementing a private cloud model improves the
allocation of resources within an organization by ensuring
that the availability of resources to individual departments/
business functions can directly and flexibly respond to the
growth needs of the business
Improved reliability;
•  while resources (servers, networks etc.) hosted internally,
the creation of virtualized operating become more resilient
to individual failures across the physical infrastructure,
when the cloud is hosted with a third party, the
organization benefits from the physical security afforded
to infrastructure hosted within data centers
Regulatory Compliance:
•  by it's very design, a Private Cloud is becoming choice in
Healthcare, Finance, and Education in response to
HIPAA, HITECH, FINRA, SEC and more
	
  
Secure Hosted IP Service
BRC
Secure	
  Hosted	
  IP	
  Service	
  
(SHIP)	
  
BRC	
  Cloud	
  
Business Recovery Center
1259 Route 46 East; Suite 105
Parsippany, NJ 07054
973 299 0302 x136
SHIP Platform
Access to the hosted environment
is provided through Citrix, one of
the most secure server access
products available
•  Anytime, anywhere, any device access
•  Customer personnel can access the platform
securely using any device, either in the
office, at home or on the road
•  A single user can securely use multiple
devices such as notebook/laptop, desktop,
tablet, smartphone, public computer (i.e.
hotel business center or kiosk)
•  Citrix creates a secure session independent
of the device itself, so no information is
stored on the actual device, all transactions
are performed in the cloud
•  Citrix uses high level (2048-bit) encryption
security
•  User desktops can be standardized per the
business’ specifications for a common user
experience, or each user can be allowed to
customize their desktop for a more personal
feel
•  Citrix can easily allow printing to a locally
attached printer without any technical
knowledge required
•  A benefit for remote users working from
wherever needing to print to a local printer
SHIP Components
Available in both shared and private
environments
	
  
Secure Hosted IP Service
BRC
•  Dedicated servers for all of your
applications
•  Domain controllers
•  Citrix Server
•  Exchange Email Server
•  File/Print Server
•  Applications provided include:
•  MS Office
•  Other duly licensed business
applications
•  Dedicated data storage for all customer
documents, files, database(s) and other
pertinent business documents. Also
includes nightly electronic backups for:
•  Server images
•  User data
•  Fully managed smart firewalls, which
are updated nightly to provide the most
current protection
•  Anti-virus
•  Anti-malware
•  Web filtering

More Related Content

What's hot

Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud ComputingAnshi Bhadoria
 
Bringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User DesktopsBringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User DesktopsDizzion, Inc.
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computingNitish Awasthi (anitish_225)
 
Cloud computing
Cloud computingCloud computing
Cloud computingRaj K
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...EuroCloud
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventAruj Thirawat
 
Fog computing veera vutti
Fog computing veera vuttiFog computing veera vutti
Fog computing veera vuttiveera vutti
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategyMicro Focus
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewSimonFenech
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)johndorian555
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingRitesh Dwivedi
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud ComputingCentriLogic
 
A Cloud Glossary
A Cloud GlossaryA Cloud Glossary
A Cloud GlossaryRapidScale
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security ChallengesYateesh Yadav
 

What's hot (19)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
Bringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User DesktopsBringing the Power of Cloud Computing to Your User Desktops
Bringing the Power of Cloud Computing to Your User Desktops
 
Cloud computing
Cloud  computingCloud  computing
Cloud computing
 
Virtualization security threats in cloud computing
Virtualization security threats in cloud computingVirtualization security threats in cloud computing
Virtualization security threats in cloud computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
Virgílio Vargas Presentations / CloudViews.Org - Cloud Computing Conference 2...
 
Througwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend EventThrougwave Day 2015 - VMware Software-Defined Techtrend Event
Througwave Day 2015 - VMware Software-Defined Techtrend Event
 
Fog computing veera vutti
Fog computing veera vuttiFog computing veera vutti
Fog computing veera vutti
 
#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy#MFSummit2016 Operate: Towards a unified endpoint management strategy
#MFSummit2016 Operate: Towards a unified endpoint management strategy
 
Codestone Cloud in a Box Overview
Codestone Cloud in a Box OverviewCodestone Cloud in a Box Overview
Codestone Cloud in a Box Overview
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 
Authentication cloud
Authentication cloudAuthentication cloud
Authentication cloud
 
Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)Infrastructure as a service (iaa s)
Infrastructure as a service (iaa s)
 
Data Confidentiality in Cloud Computing
Data Confidentiality in Cloud ComputingData Confidentiality in Cloud Computing
Data Confidentiality in Cloud Computing
 
3 Types of Cloud Computing
3 Types of Cloud Computing3 Types of Cloud Computing
3 Types of Cloud Computing
 
A Cloud Glossary
A Cloud GlossaryA Cloud Glossary
A Cloud Glossary
 
Cloud Computing Security Challenges
Cloud Computing Security ChallengesCloud Computing Security Challenges
Cloud Computing Security Challenges
 
Expedient Pyramid
Expedient Pyramid Expedient Pyramid
Expedient Pyramid
 

Viewers also liked (14)

Lecciones en Aguas Quietas
Lecciones en Aguas QuietasLecciones en Aguas Quietas
Lecciones en Aguas Quietas
 
Un poco mas
Un poco masUn poco mas
Un poco mas
 
Pascuajoven2010
Pascuajoven2010Pascuajoven2010
Pascuajoven2010
 
La basura
La basuraLa basura
La basura
 
Oanel
OanelOanel
Oanel
 
Nuestros Padres
Nuestros PadresNuestros Padres
Nuestros Padres
 
Himno a la Familia
Himno a la  FamiliaHimno a la  Familia
Himno a la Familia
 
Quiero volver
Quiero volverQuiero volver
Quiero volver
 
Gerencia estrategica mibanco vf
Gerencia estrategica mibanco vfGerencia estrategica mibanco vf
Gerencia estrategica mibanco vf
 
Slide juliany 1
Slide juliany 1Slide juliany 1
Slide juliany 1
 
La Verdad (spanish)
La Verdad (spanish)La Verdad (spanish)
La Verdad (spanish)
 
Trabalho do cedaspy
Trabalho do cedaspyTrabalho do cedaspy
Trabalho do cedaspy
 
E3
E3E3
E3
 
Para leerlo 1000 veces
Para leerlo 1000 vecesPara leerlo 1000 veces
Para leerlo 1000 veces
 

Similar to SHIP Brochure

Distributed Cloud Computing.pptx
Distributed Cloud Computing.pptxDistributed Cloud Computing.pptx
Distributed Cloud Computing.pptxPlektonLabs
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxboti39263
 
XO Enterprise Cloud
XO Enterprise CloudXO Enterprise Cloud
XO Enterprise CloudMari Hansen
 
Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Raymond Gao
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basicsRahul Gurnani
 
iomart Cloud Hosting
iomart Cloud Hostingiomart Cloud Hosting
iomart Cloud HostingGary Glasco
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing pptBhuvneshYadav13
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing FundamentalDony Riyanto
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
The ABC of Private Clouds
The ABC of Private CloudsThe ABC of Private Clouds
The ABC of Private CloudsCTRLS
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityJason Proctor
 
Expedient Public Cloud
Expedient Public CloudExpedient Public Cloud
Expedient Public CloudShawn Allaway
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing mehanasshahul
 
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDBSmart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDBManuel Daza
 
Go4Hosting Offers Highly Customisable Private Cloud Hosting Services
Go4Hosting Offers Highly Customisable Private Cloud Hosting ServicesGo4Hosting Offers Highly Customisable Private Cloud Hosting Services
Go4Hosting Offers Highly Customisable Private Cloud Hosting ServicesGo4hosting Web Hosting Provider
 
Managed Services Cloud Computing
Managed Services Cloud Computing Managed Services Cloud Computing
Managed Services Cloud Computing dcVAST
 

Similar to SHIP Brochure (20)

Distributed Cloud Computing.pptx
Distributed Cloud Computing.pptxDistributed Cloud Computing.pptx
Distributed Cloud Computing.pptx
 
The cloud ecosystem
The cloud ecosystemThe cloud ecosystem
The cloud ecosystem
 
Cloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptxCloud Computing Lecture 02.pptx
Cloud Computing Lecture 02.pptx
 
XO Enterprise Cloud
XO Enterprise CloudXO Enterprise Cloud
XO Enterprise Cloud
 
Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)Student Presentation on Cloud Computing (MCO-205)
Student Presentation on Cloud Computing (MCO-205)
 
Cloud computing & security basics
Cloud computing & security   basicsCloud computing & security   basics
Cloud computing & security basics
 
iomart Cloud Hosting
iomart Cloud Hostingiomart Cloud Hosting
iomart Cloud Hosting
 
Full cloud computing ppt
Full cloud computing pptFull cloud computing ppt
Full cloud computing ppt
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Cloud Computing Fundamental
Cloud Computing FundamentalCloud Computing Fundamental
Cloud Computing Fundamental
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
The ABC of Private Clouds
The ABC of Private CloudsThe ABC of Private Clouds
The ABC of Private Clouds
 
Windstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud SecurityWindstream Hosted Solutions: Public Cloud Security
Windstream Hosted Solutions: Public Cloud Security
 
Expedient Public Cloud
Expedient Public CloudExpedient Public Cloud
Expedient Public Cloud
 
Introduction to Cloud computing
Introduction to Cloud computing Introduction to Cloud computing
Introduction to Cloud computing
 
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDBSmart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
Smart Cloud Webinar 2014-02-13 Introduction to Softlayer IaaS MDB
 
Go4Hosting Offers Highly Customisable Private Cloud Hosting Services
Go4Hosting Offers Highly Customisable Private Cloud Hosting ServicesGo4Hosting Offers Highly Customisable Private Cloud Hosting Services
Go4Hosting Offers Highly Customisable Private Cloud Hosting Services
 
Managed Services Cloud Computing
Managed Services Cloud Computing Managed Services Cloud Computing
Managed Services Cloud Computing
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 

SHIP Brochure

  • 1. Business Recovery Center 1259 Route 46 East; Suite 105 Parsippany, NJ 07054 973 299 0302 x136 What is a Private Cloud? A private cloud is a specific model of cloud computing that involves a distinct and secure cloud based environment in which only the individual client can operate. As with other cloud models, private clouds will provide computing power as a service within a virtualized environment using an underlying pool of physical computing resource e.g. servers supporting the clients various applications. However, under the private cloud model, the cloud (the pool of resource) is only accessible by a single organization providing that organization with greater control and privacy.. Why Does My Company Need It? The private cloud model is closer to the more traditional model of individual local access networks (LANs) used in the past by enterprise but with the added advantages of virtualization. The features and benefits of private clouds therefore are: Higher security and privacy; •  techniques such as dedicated pools of resources with access restricted to connections made from behind the organization's firewall, dedicated leased lines and/or on- site internal hosting ensure that operations are kept from prying eyes More control; •  a private cloud is only accessible by a single organization, that organization will have the ability to configure and manage it online achieving a tailored network solution Cost and energy efficiency; •  implementing a private cloud model improves the allocation of resources within an organization by ensuring that the availability of resources to individual departments/ business functions can directly and flexibly respond to the growth needs of the business Improved reliability; •  while resources (servers, networks etc.) hosted internally, the creation of virtualized operating become more resilient to individual failures across the physical infrastructure, when the cloud is hosted with a third party, the organization benefits from the physical security afforded to infrastructure hosted within data centers Regulatory Compliance: •  by it's very design, a Private Cloud is becoming choice in Healthcare, Finance, and Education in response to HIPAA, HITECH, FINRA, SEC and more   Secure Hosted IP Service BRC Secure  Hosted  IP  Service   (SHIP)   BRC  Cloud  
  • 2. Business Recovery Center 1259 Route 46 East; Suite 105 Parsippany, NJ 07054 973 299 0302 x136 SHIP Platform Access to the hosted environment is provided through Citrix, one of the most secure server access products available •  Anytime, anywhere, any device access •  Customer personnel can access the platform securely using any device, either in the office, at home or on the road •  A single user can securely use multiple devices such as notebook/laptop, desktop, tablet, smartphone, public computer (i.e. hotel business center or kiosk) •  Citrix creates a secure session independent of the device itself, so no information is stored on the actual device, all transactions are performed in the cloud •  Citrix uses high level (2048-bit) encryption security •  User desktops can be standardized per the business’ specifications for a common user experience, or each user can be allowed to customize their desktop for a more personal feel •  Citrix can easily allow printing to a locally attached printer without any technical knowledge required •  A benefit for remote users working from wherever needing to print to a local printer SHIP Components Available in both shared and private environments   Secure Hosted IP Service BRC •  Dedicated servers for all of your applications •  Domain controllers •  Citrix Server •  Exchange Email Server •  File/Print Server •  Applications provided include: •  MS Office •  Other duly licensed business applications •  Dedicated data storage for all customer documents, files, database(s) and other pertinent business documents. Also includes nightly electronic backups for: •  Server images •  User data •  Fully managed smart firewalls, which are updated nightly to provide the most current protection •  Anti-virus •  Anti-malware •  Web filtering