Infrastructure in a virtual box - April 2018 - Hi-Tech Security Solutions
 
classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


Infrastructure in a virtual box
April 2018, Security Services & Risk Management, Integrated Solutions, IT infrastructure

The idea of selling cloud or hosted services is nothing new today as there are many companies, big and small, selling various cloud flavours along with ‘as-a-service’ solutions. One South African company that has taken a different approach to the cloud business is Routed Hosting.

Routed is less than two years old and sees itself as an ‘infrastructure-as-a-service wholesaler’, according to the company’s Benjamin Coetzer. Routed does not simply sell space in a data centre, it offers highly secure, fault tolerant and redundant cloud services, as if it were selling a virtual data centre. Its solutions are sold to enterprise customers as well as managed service providers (MSP) and Internet service providers (ISP), which then sell their service on to their clients.

What makes Routed different in the market is the security and reliability of its offering, which is built on a VMWare hosted environment. VMWare makes software that allows one to create virtual machines made up of components of your data centre, server or PC. For example, using a virtual machine (VM) on your PC would see you allocating a certain amount of memory to the VM and running another operating system in it, completely separate from the base operating system.

The same applies to server environments. For example, a client could ask Routed for a server or solution with a specific configuration made up of storage, memory, processing power and so forth. The client then gets their own virtual server built with VMWare to those specifications which they use for their own workloads or adapt to sell to their customers.

The benefit of this type of solution, according to Coetzer, is that VMWare offers a very secure solution. Its NSX network virtualisation and security platform allows for not only virtualisation or data centres, but also offers the security required to ensure each VM user is secure (isolated) in their own environment.

According to the VMWare website, “NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Centre (SDDC). … NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. All network components can be provisioned in minutes, without the need to modify the application. Micro-segmentation and granular security are delivered to the individual workload.”

The customer therefore obtains an ‘out-of-the-box’ virtual data centre (of whatever size they require), without having to have the technical or VMWare skills on board. All the client requires is an administrator who can manage the system from a desktop console, assign user rights, manage the firewall and backups and so on. The ‘data centre’ itself is run and managed by Routed, which ensures the system performs as specified.

Routed makes use of data centres in Cape Town and Johannesburg and the system will by default replicate customers’ virtual data centre between the two. There are different tiers of resilience the user can choose from, allowing them to adapt the solution to their requirements.

The storage in the package is managed by a NetApp system, which adds additional security and reliability to the storage portion of the Routed solution.

As for the physical data centre, Routed has bought space in Teraco’s data centres, which is ISO 27001 compliant and therefore has the required physical security processes in place to protect the physical hardware (using CCTV, access control etc.). This ensures nobody can simply walk into Teraco’s data centre and mess around with your servers. Coetzer says the physical security component is often an overlooked part of IT security.

In addition, Routed’s hardware within the data centres is also protected with independent security measures to ensure technicians can’t simply log into the system to make changes. For example, two-factor authentication has been implemented on all interfaces for everyone in the organisation. The network between the system and the client’s system is also secured, even if access is via the Internet – although this is not always the recommended option.

Routed offers a solution that offers the performance clients want, along with the security required in today’s volatile cybersecurity environments. The cybersecurity infrastructure Routed has in place incorporates a variety of systems to ensure all the bases are covered. Again, the level of customer involvement in the security function is adaptable, depending on what skills the client has in-house.

Although the company is less than two years old, Routed has seen good uptake of its offerings from customers who don’t want to have to add to their own data centres, as well as companies wanting a highly resilient and available data centre (and a data centre that can be adapted to changing requirements). Coetzer says the Routed option externalises the risk for companies which now have the resources they need without the hardware and software hassles – and they don’t have to worry what will happen if their internal IT expert leaves.

For more information, contact Routed Hosting, www.routed.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Measure it if you want to manage it
    August 2018, Adamastor Consulting, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    There is no doubt that one of the differentiators between service providers is going to be the ability to make efficient use of data. We need more data detectives to meet the challenges.
  • Using data to stay secure
    August 2018, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    Situational awareness beyond the boundary walls can have a significant impact on the security of an estate and the wellbeing of its residents.
  • Technology risk assessments
    August 2018, Adamastor Consulting, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    Rob Anderson says the role of security practitioners is to continually work on mitigating risk, both physical and technological risk.
  • What is a security risk assessment?
    August 2018, Alwinco, This Week's Editor's Pick, Security Services & Risk Management, Residential Estate (Industry)
    Alwinco's Andre Mundell takes a look at what a real security risk assessment is, what it entails and what it delivers.
  • Making data work for you
    August 2018, Excellerate Services , Security Services & Risk Management, Residential Estate (Industry)
    Security intelligence tools should have the ability to represent current and historical security system data in a user friendly manner in real time.
  • Efficient and proactive control rooms
    August 2018, Technews Publishing, This Week's Editor's Pick, Integrated Solutions, Security Services & Risk Management, Residential Estate (Industry)
    A question many estate managers face is whether they should keep the control room onsite and manage it and the relevant staff internally, or whether they should opt for a remote monitoring service.
  • Securing Serengeti
    August 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Security Services & Risk Management, Residential Estate (Industry)
    Serengeti Estate offers luxury, golf, conferencing and security, and the estate is on a new growth phase to incorporate more people and services within its 17.5 km boundary.
  • Estate expansion requires access convergence
    August 2018, Powell Tronics, Access Control & Identity Management, Integrated Solutions, Residential Estate (Industry)
    Val de Vie sets the benchmark in secure estate living through the merger of two estates and the associated access and visitor management systems.
  • Radar comes home
    August 2018, Technews Publishing, This Week's Editor's Pick, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Residential Estate (Industry)
    Covering up to 15 km in real time, radar-based perimeter and intrusion detection is set to change the way security operations on estates are managed and planned.
  • Surveillance technology that’s as blind as a bat
    August 2018, Axis Communications SA, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Residential Estate (Industry)
    Blind technologies, such as radar, should be used in conjunction with other technologies, complementing visual and thermal video surveillance to support and optimise the security system.
  • Surge protection for your ­residential appliances
    August 2018, DEHN Africa, Security Services & Risk Management, Residential Estate (Industry), Products
    Taking surge protection measures is arguably a simpler option than relying on ­insurance cover for your domestic appliances.
  • Make CCTV testify for you
    August 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Warrant Officer Bongiwe Gqotso highlighted some key points to consider when it comes to extracting evidence from your surveillance installation at the Residential Estate Security Conference 2018.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.