Write us
Our Location
P.O.Box 27041-00100 Nairobi
2nd Floor | Le'Mac Building, Church Rd, Westlands | Nairobi | Kenya
Check faq
before you ask
What is Cloud Infrastructure
A cloud storage infrastructure differs from a traditional data storage infrastructure in that it accesses files remotely over a network and is usually built on an object-based storage platform. Access to object-based storage is done through a Web services application programming interface (API) based on the Simple Object Access Protocol (SOAP) or Representational State Transfer (REST) protocol.
Among the infrastructure requirements an organization will need for its move to cloud storage are secure multi-tenancy, autonomic computing, storage efficiency, scalability, a utility computing and/or chargeback system, and integrated data protection.
Some organizations may not want to deal with housing, running and maintaining an in-house cloud storage infrastructure. If this is the case, they can contract with a cloud storage service provider for the equipment used to support cloud operations. In this provisioning model, known as Infrastructure-as-a-Service (IaaS), the service provider owns the equipment (storage, hardware, servers and networking components) and the client typically pays on a per-use basis.
What is a Data Center
Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the company's information technology (IT) needs, which typically involve storing, processing and serving large amounts of mission-critical data to clients in a client/server architecture.
While data centers are traditionally thought of as large-scale physical environments where an extensive number of computers and servers are housed, the software-defined data center (SDDC) has created a new breed of virtualized data centers and cloud-based data centers that extend a company’s on-premises infrastructure to off-premises sites. These virtual data centers can serve as a bridge to the enterprise's private data center in a hybrid, or blended, fashion, or the company can completely offload its data center operations by relying on a public data center from a third-party service provider
While data centers are traditionally thought of as large-scale physical environments where an extensive number of computers and servers are housed, the software-defined data center (SDDC) has created a new breed of virtualized data centers and cloud-based data centers that extend a company’s on-premises infrastructure to off-premises sites. These virtual data centers can serve as a bridge to the enterprise's private data center in a hybrid, or blended, fashion, or the company can completely offload its data center operations by relying on a public data center from a third-party service provider
What is Data Center Management
Data center management involves ensuring the reliability of both the connections to the data center as well as the mission-critical information contained within the data center's storage. It also entails efficiently placing application workloads on the most cost-effective compute resource available.
What is entailed in Security Management
A basic concept of security management is the information security. The primary goal of information security is to guarantee safety of information. When protecting information it is the value of the information that must be protected. These values are stipulated by the confidentiality, integrity and availability. Inferred aspects are privacy, anonymity and verifiability.
The goal of the Security Management is split up in two parts:
1.The realization of the security requirements defined in the service level agreement (SLA) and other external requirements which are specified in underpinning contracts, legislation and possible internal or external imposed policies.
2.The realization of a basic level of security. This is necessary to guarantee the continuity of the management organization. This is also necessary in order to reach a simplified service-level management for the information security, as it happens to be easier to manage a limited number of SLAs than it is to manage a large number of SLAs.
The goal of the Security Management is split up in two parts:
1.The realization of the security requirements defined in the service level agreement (SLA) and other external requirements which are specified in underpinning contracts, legislation and possible internal or external imposed policies.
2.The realization of a basic level of security. This is necessary to guarantee the continuity of the management organization. This is also necessary in order to reach a simplified service-level management for the information security, as it happens to be easier to manage a limited number of SLAs than it is to manage a large number of SLAs.