📜 ⬆️ ⬇️

Corporate IaaS digest: 25 materials on virtualization, infrastructure and information security

Today, we have compiled articles from the First Corporate IaaS Blog for you: about virtualization, cybersecurity, and cloud services. Under the cut - cases of using the cloud in various industries, materials on the work of the IaaS provider and answers to questions about the protection of PD.


/ photo by Doug Davey CC


Virtualization




Here we talk about the differences between VPS and VDS and tell you how the virtual data center (VDC) surpasses other hosting options: we compare the cost, scalability, the degree of data security and other indicators. In addition to this - let's show which of these solutions (VDC or VPS / VDS) is more suitable for large and small organizations, and why.
')



Although virtualization is a key technology in the private cloud, these two terms are not synonymous. We explain the difference between technologies and what tools each of them provides.




According to Forbes, by 2020, global companies will transfer 83% of workloads to the cloud. In this article, we have collected cases on how cloud technologies help enterprises of different sizes (small, medium and large) to conduct business: from scaling services to data storage.




This article will focus on the main layers of the virtual data center: networks, storage, applications and access. Let's tell what functions each of the levels performs.




We understand the many names of cloud services with the help of associations. Parse XaaS for example car rental. Those who are not averse to “tasting” Italian cuisine can “enjoy” our previous example about pizza.


Infrastructure




We explain why we chose the DataSpace in Moscow. We will look at the features of the power supply, cooling and security systems of our partner’s data center and conduct a mini-tour of the building’s floors.




The data center in Moscow is not our only platform. In this material, we are talking about our second data center - Xelent in St. Petersburg (which used to be called SDN). We show the main "chips" of the data center: Stack.CUB solution, energy-efficient cooling, "multi-layered" security system.




After reading this article, you will learn what to look for when choosing a data center for an IaaS project, where Tier certification came from, and why Tier 2+ is not always better than Tier 2. Tricks are some owners of data centers to attract customers.


Cases




According to a SITA study , 95% of airlines and 85% of airports plan to deploy cloud services by 2020. S7 Airlines representatives will tell you how the company has virtualized the S7 t-Retail IT infrastructure, and why it chose the cloud IT-GRAD.




This article will discuss how employees and customers of the Tata Motors automotive company use web services in the cloud. We will also talk about the “cloud” projects of the subsidiary organization of the auto concern - Jaguar Land Rover, in particular, the system for notifying the owners of cars of bumps and obstacles on the road.




Analyzing the case of The Weather Channel, which predicts weather changes around the world. You will learn why The Weather Channel has several cloud platforms and how “outdated” applications and equipment have prevented companies from migrating to the cloud.




In this material, we interview the heads of the IT and marketing departments of the Delivery Club project. Representatives of the food delivery service talk about the company's history and the reasons for the transition to the IT-GRAD cloud.




The MDG team shares the experience of using the cloud in VoiceFabric and Reader speech synthesis solutions. In addition, you will learn about the joint project of MDGs and MegaFon - the virtual consultant Elena and the voice interaction system VoiceNavigator.




In the first week of release of Angry Birds 2.0, the number of downloads exceeded 20 million. With such loads on IT infrastructure, it should scale well. Therefore, the developers of Rovio Entertainment have created their own cloud platform - Hatch. The fact that "can" Hatch, we are talking in this article.


/ photo by Alan Levine PD


Information Security




The material is suitable for those who would like to understand the definitions of the federal law of the Russian Federation on the protection of personal data: what information can be called confidential, and which information falls into the category of official or state secrets? Separately, we highlight the requirements for personal data operators and highlight issues of system certification to protect confidential information.




Let us explain how things are going with security in the cloud and what tools and methods the provider uses to protect the infrastructure and customer data from cyber attacks.




Here we answer basic questions about the PCI DSS standard. Who needs certification? What are the requirements? How to get a certificate of conformity? You can read more about the difficulties of PCI DSS certification here , and about our certification experience here and here .




How do DPI systems filter traffic and analyze the “behavior” of packets, how they cope with the attacks of TCP Syn Flood and UDP Flood and how the per-service and per-subscriber modes differ for channel distribution between applications. All this further.




What is the RaaS service and how to choose a reliable RaaS provider? We are answering these questions and sorting out all the steps of the “recovery as a service” service: from data protection to restoring the environment.


Work with IaaS




Forrester predicts that in 2018 the number of global companies using a public cloud will reach 50% for the first time. In this article, we will explain what you should take care of before moving to the cloud to simplify this process.




Using the example of the NovaPress Publisher web service, we will explain how a flexible increase in IaaS cloud capacity helps to cope with seasonal loads on the network and infrastructure.




Here we reveal the subtleties of the service level agreement (SLA): the availability of services, reporting, the significance of exceptions in the agreement, etc. The article will be useful as a reminder before signing the contract with the provider, as it will help avoid risks.




We offer 4 working rules and 3 basic methods for calculating resources for a terminal server in the provider cloud. Let's talk about popular automation tools: AutoIT scripts and the Sizing Guide method (which we use in IT-GRAD).




We will explain how the technical support service works on a personal example. We will tell about our monitoring tools: SCOM, ZABBIX and USM and show how IT-GRAD technical support specialists use the ServiceNow platform for incident handling.




Why should companies not move their customer data to the sites of foreign providers? We discuss issues of legislation and technical difficulties related to access speed.



PS Our other collections and digests:

Source: https://habr.com/ru/post/351414/


All Articles