Infrastructure in a virtual box

April 2018 Security Services & Risk Management, Integrated Solutions, Infrastructure

The idea of selling cloud or hosted services is nothing new today as there are many companies, big and small, selling various cloud flavours along with ‘as-a-service’ solutions. One South African company that has taken a different approach to the cloud business is Routed Hosting.

Routed is less than two years old and sees itself as an ‘infrastructure-as-a-service wholesaler’, according to the company’s Benjamin Coetzer. Routed does not simply sell space in a data centre, it offers highly secure, fault tolerant and redundant cloud services, as if it were selling a virtual data centre. Its solutions are sold to enterprise customers as well as managed service providers (MSP) and Internet service providers (ISP), which then sell their service on to their clients.

What makes Routed different in the market is the security and reliability of its offering, which is built on a VMWare hosted environment. VMWare makes software that allows one to create virtual machines made up of components of your data centre, server or PC. For example, using a virtual machine (VM) on your PC would see you allocating a certain amount of memory to the VM and running another operating system in it, completely separate from the base operating system.

The same applies to server environments. For example, a client could ask Routed for a server or solution with a specific configuration made up of storage, memory, processing power and so forth. The client then gets their own virtual server built with VMWare to those specifications which they use for their own workloads or adapt to sell to their customers.

The benefit of this type of solution, according to Coetzer, is that VMWare offers a very secure solution. Its NSX network virtualisation and security platform allows for not only virtualisation or data centres, but also offers the security required to ensure each VM user is secure (isolated) in their own environment.

According to the VMWare website, “NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Centre (SDDC). … NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. All network components can be provisioned in minutes, without the need to modify the application. Micro-segmentation and granular security are delivered to the individual workload.”

The customer therefore obtains an ‘out-of-the-box’ virtual data centre (of whatever size they require), without having to have the technical or VMWare skills on board. All the client requires is an administrator who can manage the system from a desktop console, assign user rights, manage the firewall and backups and so on. The ‘data centre’ itself is run and managed by Routed, which ensures the system performs as specified.

Routed makes use of data centres in Cape Town and Johannesburg and the system will by default replicate customers’ virtual data centre between the two. There are different tiers of resilience the user can choose from, allowing them to adapt the solution to their requirements.

The storage in the package is managed by a NetApp system, which adds additional security and reliability to the storage portion of the Routed solution.

As for the physical data centre, Routed has bought space in Teraco’s data centres, which is ISO 27001 compliant and therefore has the required physical security processes in place to protect the physical hardware (using CCTV, access control etc.). This ensures nobody can simply walk into Teraco’s data centre and mess around with your servers. Coetzer says the physical security component is often an overlooked part of IT security.

In addition, Routed’s hardware within the data centres is also protected with independent security measures to ensure technicians can’t simply log into the system to make changes. For example, two-factor authentication has been implemented on all interfaces for everyone in the organisation. The network between the system and the client’s system is also secured, even if access is via the Internet – although this is not always the recommended option.

Routed offers a solution that offers the performance clients want, along with the security required in today’s volatile cybersecurity environments. The cybersecurity infrastructure Routed has in place incorporates a variety of systems to ensure all the bases are covered. Again, the level of customer involvement in the security function is adaptable, depending on what skills the client has in-house.

Although the company is less than two years old, Routed has seen good uptake of its offerings from customers who don’t want to have to add to their own data centres, as well as companies wanting a highly resilient and available data centre (and a data centre that can be adapted to changing requirements). Coetzer says the Routed option externalises the risk for companies which now have the resources they need without the hardware and software hassles – and they don’t have to worry what will happen if their internal IT expert leaves.

For more information, contact Routed Hosting, www.routed.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
The HR Trap
Security Services & Risk Management Training & Education
When human resources becomes a risk factor. Andre du Venage examines why your CCTV security and other technology risks are covered, but human resources are often overlooked.

Read more...
AI rewrites financial crime
Security Services & Risk Management Financial (Industry)
Criminals are exploiting South Africa’s high connectivity and still-maturing regulation to scale attacks faster than we can defend them. The speed and sophistication of these scams are outpacing the systems designed to stop them.

Read more...
Strengthening organisational integrity in 2026 and beyond
iFacts Security Services & Risk Management
In 2026, the risks facing organisations, whether in the corporate sector or government, will be more complex and far-reaching. Employee screening will have to be more complex and comprehensive.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.