SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
SKIRE HOSTING SERVICES


                Overview and Benefits
                Skire provides a complete set of application hosting services including all equipment,
                hardware, 3rd party software, facilities and services necessary to host and maintain
                the applications such that customers can access and use the Application via an
                Internet browser meeting Skire’s then-current specifications. The benefits of a
                Skire-hosted deployment include lower initial and ongoing costs, a dedicated staff of
                resources focused solely on maintaining Skire’s applications, and an extensive
                hosting and security infrastructure.

                Rapid Deployment
                Because the infrastructure to support the applications is already in place, customers
                can have immediate access without waiting for the procurement, configuration and
                installation of any hardware or software.

                Security & Reliability
                Skire provides a comprehensive infrastructure in support of the Skire-hosted
                applications to ensure the highest levels of performance, reliability and security.

                Dedicated Resources & Expertise
                The Skire Network Operations Group is focused entirely on deploying and
                maintaining Skire’s applications, and continuously monitors our systems and
                applications.

                Automatic Software Upgrades
                As a Skire-hosted solution, customers have immediate access to the latest product
                upgrades without undergoing any installation effort.

                Lower Total Cost of Ownership
                As a Skire-hosted solution, the cost associated with purchasing servers and 3rd
                party software is eliminated, as the only infrastructure requirement is Internet
                Explorer®. In addition, there are other significant reductions in customer’s total cost
                of ownership by eliminating the soft costs associated with allocating resources to
                install up and maintain the system.

                Infrastructure & Security
                Skire provides a comprehensive security infrastructure that includes formal security
                policies, a dedicated team of security personnel, and partnerships with industry
                leading technology providers to ensure the highest levels of system and data
                reliability. Protection is provided through a combination of physical security, network
                security, and security measures within the applications themselves. Skire’s security
                policies include data encryption, anti-virus process, security audits, database
                credentials coding, DMZ, password protection, risk assessment, and server security.
                Skire’s security personnel have clearly defined roles and responsibilities to ensure
                that security goals are met. Among the features of Skire’s security infrastructure are
                production server hosting at SAVVIS, a real-time intrusion detection system, daily
                data tape backups, firewall protection, role-based access control within the
                application, stringent authentication processes, and a disaster recovery plan.

                Data Center
                Skire’s application and data servers are hosted at a SAVVIS Internet Data Center
                (IDC), which is used by companies with large-scale and secure hosting requirements
                such as Merrill Lynch, Yahoo and American Airlines. The IDC is a custom-designed
                facility with raised floors, HVAC temperature control systems with separate cooling
                zones, and seismically braced racks. The IDC has physical security systems such as,


                                                         Copyright © 2007 Skire, Inc. All rights reserved.



www.skire.com
SKIRE HOSTING SERVICES


                advanced smoke detection and suppression systems, 24/7 secured access with
                motion sensors, video camera surveillance, and security breach alarms. The IDC
                features a redundant network of multiple fiber trunks from multiple sources,
                redundant power on the premises, and multiple backup generators. The network of
                IDC’s operates throughout the world in major metropolitan areas, with close
                proximity to major and private interconnects.

                Intrusion Detection
                Skire deploys a host-based, real-time intrusion monitoring system that detects
                unauthorized activity and security breaches and responds automatically. If the
                system detects a threat, it sends automatic notifications or takes other
                countermeasures according to pre-established security policies in order to prevent
                information loss or theft. The system enables the development of precautionary
                security policies that prevent expert hackers or authorized users with malicious
                intent from misusing systems, applications, and data. Skire’s intrusion detection
                system also provides complete control over systems with policy-based management
                that determines which systems and activities to monitor and what actions to take, as
                well as with real-time intrusion detection reports for both host and network
                components.

                Firewall and Data Encryption
                Skire uses Watchguard’s Firebox X technology which provides comprehensive
                protection with security proxies and dynamic packet filtering, along with branch
                office and remote user VPN support. The LiveSecurity features allow the system to
                maintain constant updates of the software to prevent new potential threats. Only
                HTTP port 80, HTTPS port 443, and external monitoring ports are open; all other
                ports are closed to access. Incoming and outgoing e-mail is scanned using the
                Norton Antivirus Corporate Edition for Microsoft Exchange after passing through
                scanning by the Watchguard Firebox. Secure Socket Layer (SSL) is implemented in
                Unifier for transport layer security.

                Data Tape Backups
                Backup images of system data are made throughout the day that can be restored
                within minutes. In addition, daily tape backups are made of all data and critical
                application systems using Veritas Backup Exec software and a Sony AIT-3 backup
                tape drive. Tapes are picked up and stored off-site in a secure, third-party facility.

                Online Digital Vault Backup
                 Skire utilizes an online backup and recovery solution that automates data protection
                through a comprehensive “hands-free” process via a web-based interface. The
                service provides Continuous Data Protection (CDP) of customer data offsite and
                makes it immediately retrievable via snapshots every 15 minutes.




                                                         Copyright © 2007 Skire, Inc. All rights reserved.



www.skire.com

Más contenido relacionado

La actualidad más candente

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesNir Cohen
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNorth Texas Chapter of the ISSA
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0Shah Sheikh
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security ProductsDigital Bond
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure spherePushkar Saraf
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security WebinarAVEVA
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...www.securitysystems.best
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesCharalampos Doukas
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of buildingCharles "Chuck" Speicher Jr.
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture InnoTech
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefLancope, Inc.
 

La actualidad más candente (20)

SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0DTS Solution - Software Defined Security v1.0
DTS Solution - Software Defined Security v1.0
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
 
Nozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company IntroductionNozomi Networks Q1_2018 Company Introduction
Nozomi Networks Q1_2018 Company Introduction
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
SCADA Security Webinar
SCADA Security WebinarSCADA Security Webinar
SCADA Security Webinar
 
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
Best Data Center Physical Security using Cloud-Based AI Devices: Gain Total N...
 
Enabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health DevicesEnabling Data Protection through PKI encryption in IoT m-Health Devices
Enabling Data Protection through PKI encryption in IoT m-Health Devices
 
Sfa community of practice a natural way of building
Sfa community of practice  a natural way of buildingSfa community of practice  a natural way of building
Sfa community of practice a natural way of building
 
Network Security Architecture
Network Security Architecture Network Security Architecture
Network Security Architecture
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 

Destacado

Assistive Technology of Alaska - About us!
Assistive Technology of Alaska - About us!Assistive Technology of Alaska - About us!
Assistive Technology of Alaska - About us!ATLA
 
Dive Into iPads for Assistive Technology
Dive Into iPads for Assistive TechnologyDive Into iPads for Assistive Technology
Dive Into iPads for Assistive TechnologyATLA
 
My Story of Transformation - RunIn United - 2013
My Story of Transformation - RunIn United - 2013My Story of Transformation - RunIn United - 2013
My Story of Transformation - RunIn United - 2013Rachelle Diamond
 
Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...
Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...
Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...OpinionWay
 
Information metier hotellerie restauration personnel d'étage www.hotellerie r...
Information metier hotellerie restauration personnel d'étage www.hotellerie r...Information metier hotellerie restauration personnel d'étage www.hotellerie r...
Information metier hotellerie restauration personnel d'étage www.hotellerie r...Emploi Hotellerie Restauration
 
205350 unifier and contract management
205350 unifier and contract management205350 unifier and contract management
205350 unifier and contract managementp6academy
 
Location auvergne ski & nature
Location auvergne    ski & natureLocation auvergne    ski & nature
Location auvergne ski & natureKarine Le Bris
 
iWash : The Smart Laundry
iWash : The Smart LaundryiWash : The Smart Laundry
iWash : The Smart LaundryDavid Espic
 
Hébergement en-nontronnais
Hébergement en-nontronnaisHébergement en-nontronnais
Hébergement en-nontronnaisMairie
 
Présentation de nos activités économiques
Présentation de nos activités économiquesPrésentation de nos activités économiques
Présentation de nos activités économiquesApajh14
 
La region PACA ( ma région )
La region PACA  ( ma région )La region PACA  ( ma région )
La region PACA ( ma région )Balcon60
 

Destacado (20)

Bon a savoir 1
Bon a savoir 1Bon a savoir 1
Bon a savoir 1
 
Violins
Violins   Violins
Violins
 
I pad basics rml
I pad basics rmlI pad basics rml
I pad basics rml
 
Assistive Technology of Alaska - About us!
Assistive Technology of Alaska - About us!Assistive Technology of Alaska - About us!
Assistive Technology of Alaska - About us!
 
Dive Into iPads for Assistive Technology
Dive Into iPads for Assistive TechnologyDive Into iPads for Assistive Technology
Dive Into iPads for Assistive Technology
 
Catalogue E+F 2013
Catalogue E+F 2013Catalogue E+F 2013
Catalogue E+F 2013
 
Manal
ManalManal
Manal
 
My Story of Transformation - RunIn United - 2013
My Story of Transformation - RunIn United - 2013My Story of Transformation - RunIn United - 2013
My Story of Transformation - RunIn United - 2013
 
Olivier Desforges
Olivier DesforgesOlivier Desforges
Olivier Desforges
 
Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...
Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...
Les coûts cachés des biens électroménagers et multimédia - Sondage OpinionWay...
 
Information metier hotellerie restauration personnel d'étage www.hotellerie r...
Information metier hotellerie restauration personnel d'étage www.hotellerie r...Information metier hotellerie restauration personnel d'étage www.hotellerie r...
Information metier hotellerie restauration personnel d'étage www.hotellerie r...
 
205350 unifier and contract management
205350 unifier and contract management205350 unifier and contract management
205350 unifier and contract management
 
Location auvergne ski & nature
Location auvergne    ski & natureLocation auvergne    ski & nature
Location auvergne ski & nature
 
iWash : The Smart Laundry
iWash : The Smart LaundryiWash : The Smart Laundry
iWash : The Smart Laundry
 
Android à domicile
Android à domicileAndroid à domicile
Android à domicile
 
Hébergement en-nontronnais
Hébergement en-nontronnaisHébergement en-nontronnais
Hébergement en-nontronnais
 
Présentation de nos activités économiques
Présentation de nos activités économiquesPrésentation de nos activités économiques
Présentation de nos activités économiques
 
La region PACA ( ma région )
La region PACA  ( ma région )La region PACA  ( ma région )
La region PACA ( ma région )
 
Tarea 2
Tarea 2Tarea 2
Tarea 2
 
La fenêtre
La fenêtreLa fenêtre
La fenêtre
 

Similar a SKIRE HOSTING SERVICES

SecureWorks
SecureWorksSecureWorks
SecureWorksjduhaime
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Serviceswebhostingguy
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurrezkellahhichem
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 Cyd Isaak Francisco
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leafletNetExplorer
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfoliojclauer
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdfMetaorange
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceMSAdvAnalytics
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptxMetaorange
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...online Marketing
 

Similar a SKIRE HOSTING SERVICES (20)

SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016 New VIPRE_DS_EndpointSecurity_2016
New VIPRE_DS_EndpointSecurity_2016
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leaflet
 
ANS Solution Portfolio
ANS Solution PortfolioANS Solution Portfolio
ANS Solution Portfolio
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
CyberHive Offers CyberHive Connect, Built Using a Secure-by-Design Methodolog...
 

Más de webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guidewebhostingguy
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidationwebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 

Más de webhostingguy (20)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
MySQL and memcached Guide
MySQL and memcached GuideMySQL and memcached Guide
MySQL and memcached Guide
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
SQL Server 2008 Consolidation
SQL Server 2008 ConsolidationSQL Server 2008 Consolidation
SQL Server 2008 Consolidation
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
Notes8
Notes8Notes8
Notes8
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 

SKIRE HOSTING SERVICES

  • 1. SKIRE HOSTING SERVICES Overview and Benefits Skire provides a complete set of application hosting services including all equipment, hardware, 3rd party software, facilities and services necessary to host and maintain the applications such that customers can access and use the Application via an Internet browser meeting Skire’s then-current specifications. The benefits of a Skire-hosted deployment include lower initial and ongoing costs, a dedicated staff of resources focused solely on maintaining Skire’s applications, and an extensive hosting and security infrastructure. Rapid Deployment Because the infrastructure to support the applications is already in place, customers can have immediate access without waiting for the procurement, configuration and installation of any hardware or software. Security & Reliability Skire provides a comprehensive infrastructure in support of the Skire-hosted applications to ensure the highest levels of performance, reliability and security. Dedicated Resources & Expertise The Skire Network Operations Group is focused entirely on deploying and maintaining Skire’s applications, and continuously monitors our systems and applications. Automatic Software Upgrades As a Skire-hosted solution, customers have immediate access to the latest product upgrades without undergoing any installation effort. Lower Total Cost of Ownership As a Skire-hosted solution, the cost associated with purchasing servers and 3rd party software is eliminated, as the only infrastructure requirement is Internet Explorer®. In addition, there are other significant reductions in customer’s total cost of ownership by eliminating the soft costs associated with allocating resources to install up and maintain the system. Infrastructure & Security Skire provides a comprehensive security infrastructure that includes formal security policies, a dedicated team of security personnel, and partnerships with industry leading technology providers to ensure the highest levels of system and data reliability. Protection is provided through a combination of physical security, network security, and security measures within the applications themselves. Skire’s security policies include data encryption, anti-virus process, security audits, database credentials coding, DMZ, password protection, risk assessment, and server security. Skire’s security personnel have clearly defined roles and responsibilities to ensure that security goals are met. Among the features of Skire’s security infrastructure are production server hosting at SAVVIS, a real-time intrusion detection system, daily data tape backups, firewall protection, role-based access control within the application, stringent authentication processes, and a disaster recovery plan. Data Center Skire’s application and data servers are hosted at a SAVVIS Internet Data Center (IDC), which is used by companies with large-scale and secure hosting requirements such as Merrill Lynch, Yahoo and American Airlines. The IDC is a custom-designed facility with raised floors, HVAC temperature control systems with separate cooling zones, and seismically braced racks. The IDC has physical security systems such as, Copyright © 2007 Skire, Inc. All rights reserved. www.skire.com
  • 2. SKIRE HOSTING SERVICES advanced smoke detection and suppression systems, 24/7 secured access with motion sensors, video camera surveillance, and security breach alarms. The IDC features a redundant network of multiple fiber trunks from multiple sources, redundant power on the premises, and multiple backup generators. The network of IDC’s operates throughout the world in major metropolitan areas, with close proximity to major and private interconnects. Intrusion Detection Skire deploys a host-based, real-time intrusion monitoring system that detects unauthorized activity and security breaches and responds automatically. If the system detects a threat, it sends automatic notifications or takes other countermeasures according to pre-established security policies in order to prevent information loss or theft. The system enables the development of precautionary security policies that prevent expert hackers or authorized users with malicious intent from misusing systems, applications, and data. Skire’s intrusion detection system also provides complete control over systems with policy-based management that determines which systems and activities to monitor and what actions to take, as well as with real-time intrusion detection reports for both host and network components. Firewall and Data Encryption Skire uses Watchguard’s Firebox X technology which provides comprehensive protection with security proxies and dynamic packet filtering, along with branch office and remote user VPN support. The LiveSecurity features allow the system to maintain constant updates of the software to prevent new potential threats. Only HTTP port 80, HTTPS port 443, and external monitoring ports are open; all other ports are closed to access. Incoming and outgoing e-mail is scanned using the Norton Antivirus Corporate Edition for Microsoft Exchange after passing through scanning by the Watchguard Firebox. Secure Socket Layer (SSL) is implemented in Unifier for transport layer security. Data Tape Backups Backup images of system data are made throughout the day that can be restored within minutes. In addition, daily tape backups are made of all data and critical application systems using Veritas Backup Exec software and a Sony AIT-3 backup tape drive. Tapes are picked up and stored off-site in a secure, third-party facility. Online Digital Vault Backup Skire utilizes an online backup and recovery solution that automates data protection through a comprehensive “hands-free” process via a web-based interface. The service provides Continuous Data Protection (CDP) of customer data offsite and makes it immediately retrievable via snapshots every 15 minutes. Copyright © 2007 Skire, Inc. All rights reserved. www.skire.com