Infrastructure in a virtual box

April 2018 Security Services & Risk Management, Integrated Solutions, Infrastructure

The idea of selling cloud or hosted services is nothing new today as there are many companies, big and small, selling various cloud flavours along with ‘as-a-service’ solutions. One South African company that has taken a different approach to the cloud business is Routed Hosting.

Routed is less than two years old and sees itself as an ‘infrastructure-as-a-service wholesaler’, according to the company’s Benjamin Coetzer. Routed does not simply sell space in a data centre, it offers highly secure, fault tolerant and redundant cloud services, as if it were selling a virtual data centre. Its solutions are sold to enterprise customers as well as managed service providers (MSP) and Internet service providers (ISP), which then sell their service on to their clients.

What makes Routed different in the market is the security and reliability of its offering, which is built on a VMWare hosted environment. VMWare makes software that allows one to create virtual machines made up of components of your data centre, server or PC. For example, using a virtual machine (VM) on your PC would see you allocating a certain amount of memory to the VM and running another operating system in it, completely separate from the base operating system.

The same applies to server environments. For example, a client could ask Routed for a server or solution with a specific configuration made up of storage, memory, processing power and so forth. The client then gets their own virtual server built with VMWare to those specifications which they use for their own workloads or adapt to sell to their customers.

The benefit of this type of solution, according to Coetzer, is that VMWare offers a very secure solution. Its NSX network virtualisation and security platform allows for not only virtualisation or data centres, but also offers the security required to ensure each VM user is secure (isolated) in their own environment.

According to the VMWare website, “NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Centre (SDDC). … NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. All network components can be provisioned in minutes, without the need to modify the application. Micro-segmentation and granular security are delivered to the individual workload.”

The customer therefore obtains an ‘out-of-the-box’ virtual data centre (of whatever size they require), without having to have the technical or VMWare skills on board. All the client requires is an administrator who can manage the system from a desktop console, assign user rights, manage the firewall and backups and so on. The ‘data centre’ itself is run and managed by Routed, which ensures the system performs as specified.

Routed makes use of data centres in Cape Town and Johannesburg and the system will by default replicate customers’ virtual data centre between the two. There are different tiers of resilience the user can choose from, allowing them to adapt the solution to their requirements.

The storage in the package is managed by a NetApp system, which adds additional security and reliability to the storage portion of the Routed solution.

As for the physical data centre, Routed has bought space in Teraco’s data centres, which is ISO 27001 compliant and therefore has the required physical security processes in place to protect the physical hardware (using CCTV, access control etc.). This ensures nobody can simply walk into Teraco’s data centre and mess around with your servers. Coetzer says the physical security component is often an overlooked part of IT security.

In addition, Routed’s hardware within the data centres is also protected with independent security measures to ensure technicians can’t simply log into the system to make changes. For example, two-factor authentication has been implemented on all interfaces for everyone in the organisation. The network between the system and the client’s system is also secured, even if access is via the Internet – although this is not always the recommended option.

Routed offers a solution that offers the performance clients want, along with the security required in today’s volatile cybersecurity environments. The cybersecurity infrastructure Routed has in place incorporates a variety of systems to ensure all the bases are covered. Again, the level of customer involvement in the security function is adaptable, depending on what skills the client has in-house.

Although the company is less than two years old, Routed has seen good uptake of its offerings from customers who don’t want to have to add to their own data centres, as well as companies wanting a highly resilient and available data centre (and a data centre that can be adapted to changing requirements). Coetzer says the Routed option externalises the risk for companies which now have the resources they need without the hardware and software hassles – and they don’t have to worry what will happen if their internal IT expert leaves.

For more information, contact Routed Hosting, www.routed.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
New firearms training modules from ITA
News & Events Security Services & Risk Management
The International Firearm Training Academy has launched two new firearms training modules to support career development in the firearms industry: the Maintenance Fitter and the Firearms Custodian modules.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...