classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017

Infrastructure in a virtual box
April 2018, Security Services & Risk Management, Integrated Solutions, IT infrastructure

The idea of selling cloud or hosted services is nothing new today as there are many companies, big and small, selling various cloud flavours along with ‘as-a-service’ solutions. One South African company that has taken a different approach to the cloud business is Routed Hosting.

Routed is less than two years old and sees itself as an ‘infrastructure-as-a-service wholesaler’, according to the company’s Benjamin Coetzer. Routed does not simply sell space in a data centre, it offers highly secure, fault tolerant and redundant cloud services, as if it were selling a virtual data centre. Its solutions are sold to enterprise customers as well as managed service providers (MSP) and Internet service providers (ISP), which then sell their service on to their clients.

What makes Routed different in the market is the security and reliability of its offering, which is built on a VMWare hosted environment. VMWare makes software that allows one to create virtual machines made up of components of your data centre, server or PC. For example, using a virtual machine (VM) on your PC would see you allocating a certain amount of memory to the VM and running another operating system in it, completely separate from the base operating system.

The same applies to server environments. For example, a client could ask Routed for a server or solution with a specific configuration made up of storage, memory, processing power and so forth. The client then gets their own virtual server built with VMWare to those specifications which they use for their own workloads or adapt to sell to their customers.

The benefit of this type of solution, according to Coetzer, is that VMWare offers a very secure solution. Its NSX network virtualisation and security platform allows for not only virtualisation or data centres, but also offers the security required to ensure each VM user is secure (isolated) in their own environment.

According to the VMWare website, “NSX delivers a completely new operational model for networking that forms the foundation of the Software-Defined Data Centre (SDDC). … NSX enables the creation of entire networks in software and embeds them in the hypervisor layer, abstracted from the underlying physical hardware. All network components can be provisioned in minutes, without the need to modify the application. Micro-segmentation and granular security are delivered to the individual workload.”

The customer therefore obtains an ‘out-of-the-box’ virtual data centre (of whatever size they require), without having to have the technical or VMWare skills on board. All the client requires is an administrator who can manage the system from a desktop console, assign user rights, manage the firewall and backups and so on. The ‘data centre’ itself is run and managed by Routed, which ensures the system performs as specified.

Routed makes use of data centres in Cape Town and Johannesburg and the system will by default replicate customers’ virtual data centre between the two. There are different tiers of resilience the user can choose from, allowing them to adapt the solution to their requirements.

The storage in the package is managed by a NetApp system, which adds additional security and reliability to the storage portion of the Routed solution.

As for the physical data centre, Routed has bought space in Teraco’s data centres, which is ISO 27001 compliant and therefore has the required physical security processes in place to protect the physical hardware (using CCTV, access control etc.). This ensures nobody can simply walk into Teraco’s data centre and mess around with your servers. Coetzer says the physical security component is often an overlooked part of IT security.

In addition, Routed’s hardware within the data centres is also protected with independent security measures to ensure technicians can’t simply log into the system to make changes. For example, two-factor authentication has been implemented on all interfaces for everyone in the organisation. The network between the system and the client’s system is also secured, even if access is via the Internet – although this is not always the recommended option.

Routed offers a solution that offers the performance clients want, along with the security required in today’s volatile cybersecurity environments. The cybersecurity infrastructure Routed has in place incorporates a variety of systems to ensure all the bases are covered. Again, the level of customer involvement in the security function is adaptable, depending on what skills the client has in-house.

Although the company is less than two years old, Routed has seen good uptake of its offerings from customers who don’t want to have to add to their own data centres, as well as companies wanting a highly resilient and available data centre (and a data centre that can be adapted to changing requirements). Coetzer says the Routed option externalises the risk for companies which now have the resources they need without the hardware and software hassles – and they don’t have to worry what will happen if their internal IT expert leaves.

For more information, contact Routed Hosting,

  Share via Twitter   Share via LinkedIn      

Further reading:

  • The IQ of a shrimp
    April 2018, Naxian Systems, This Week's Editor's Pick, Integrated Solutions, IT infrastructure, Security Services & Risk Management
    Amidst all the talk and confusion, Hi-Tech Security Solutions talks to Bernard Senekal to get a better understanding of what artificial intelligence really is.
  • Tiers of remote monitoring
    April 2018, Stallion Electronic Security, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    Hi-Tech Security Solutions spoke to Kevin Monk, MD of the electronic security division of Stallion Security to find out what the options are when retaining a third party as a remote monitoring service provider.
  • See evil, hear evil, raise the alarm
    April 2018, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Audio analytics is a stand-alone solution, but it enhances the security operation when integrated with video surveillance solutions.
  • Making smart cities see
    April 2018, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
    Cutting-edge technology is required to make a city work and video management software plays an important role in making the establishment of a smart city a success.
  • Droning on about compliance
    April 2018, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Drones are cool, but there are mountains of regulations for using them in an official business capacity.
  • Drones identify people on the ground in real time
    April 2018, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    Cortica’s unique self-learning technology, backed by more than 200 patents, is the first AI company capable of human-level image understanding.
  • The question of value
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
    How do you know your surveillance installation is delivering value? Do your service providers deliver value?
  • Surveillance-friendly storage
    April 2018, Capsule Technologies, Seagate Technology, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Storage solutions for surveillance must be designed for intense sequential writing to the disk and random reading. Your average desktop hard disk won’t do the job.
  • Beyond the hype: tomorrow’s surveillance, today’s reality
    April 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions, IT infrastructure, Conferences & Events, Training & Education
    iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.
  • Securing your surveillance
    April 2018, Cyber Security, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
    What are the basics your average company can do to secure its surveillance infrastructure from the various threats out there?
  • Eight things to consider when designing a camera perimeter
    April 2018, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
    PureTech Systems offers eight practical tips to remember when designing a camera-based perimeter security solution.
  • Putting a face to facial biometrics
    April 2018, Panasonic South Africa, Forbatt SA, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
    Put your hands back in your pockets, facial biometrics is the new sweetheart of the surveillance world and certain companies are taking advantage to the potential.

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.