SlideShare a Scribd company logo
Horizon Data Center Solutions: Company & Capabilities Overview Horizon Data Center Solutions: Company & Capabilities Overview
Horizon provides secure, stable and scalable IT Infrastructure for mission critical applications. Infrastructure-as-a-Service (IaaS) provider serving: Global 1000 US Federal Government Mid-market enterprises Solve technology problems through purpose-built cloud architecture ( vStructure™ )  Redundant Network Connectivity and Power Infrastructure Ability to Grow with Customer’s Success US Federal Government Tested Data Security Compelling ROI On June 28, 2011, became first IaaS provider to receive an Authority to Operate (ATO) under the US Government ’ s  “ Cloud First ”  cost savings initiative. Completed best-in-class audits, including SAS 70 Type II (SSAE 16) and NIST 800-53 accreditation (containing over 30 times the control objectives for a typical SAS 70 Type II audit). Our Story 2
Our Operations We manage  ALL  layers of our infrastructure so we can ensure the quality and performance of our solutions. Founded in 2000 as Mareechi and merged with Horizon Data Center Solutions in 2009 We designed our infrastructure for mission critical managed hosting, cloud computing and colocation We operate 3 Tier III data centers (two in Dallas, one in Northern Virginia) We’ve established top-tier partnerships and invested in  “best of breed” capability on your behalf 3
Our Customer Experience We understand what matters most. Security:  in today’s world, CIOs face more security and compliance challenges than ever.  We ’ ve been accredited to provide IaaS solutions to US Federal Government branches that are hyper-sensitive to security concerns (ie: Homeland Security, US Department of Treasury, etc.). Stability:  disaster recovery, business continuity and availability are core to your decision.  Not only do we adhere to contractually defined SLAs, but we ’ re one of the few providers that actually  proactively  report to our clients on performance levels. Scalability:  it ’ s critical that you choose a partner that can adapt and scale the solution.  We customize solutions to your needs today and we anticipate (with you) requirements for the future. Accessibility:  outsourcing doesn‘t   mean you have to lose control or visibility. We simply provide security, stability and scalability while you maintain direct control of your IT operations. Administrative Ease:  engaging a technology vendor shouldn‘t be tedious. We move fast and won ’ t burden your staff, budget and timeline with tedious contracting, billing and administrative hassles. Fiscal Viability:  the ROI has to make sense. Pay for what you need, gain access to best-of-breed assets and forego cost- ineffective  capital expenditures associated with building in-house. 4
Common  “ Pain Points ” Economic uncertainty driving CIOs to halt projects, freeze hiring and pile more responsibility on  existing IT staff Focus on key applications 93% of SMBs that suffer significant data loss are out of business in 5 years  (US Bureau of labor) Outages can cost SMBs over $12,000 per day  (Symantec – 2011 SMB Disaster Recovery Survey) August 2011: Amazon EC2 outage takes down Foursquare, Instagram, Quora, Reddit… 50% of SMBs have no disaster recovery plan in place, even though 65% of them operate in areas  vulnerable to natural disasters.  (Symantec – 2011 SMB Disaster Recovery Survey) According to  USA Today , security firm CardCops has been tracking a 20% year-over-year  increase of hackers testing batches of payment card numbers to ensure they are still active Corporate governance, privacy and security issues have created an increase in regulation IT management must seriously consider how corporate data is used, accessed, archived, protected Increased accountability and scrutiny is being placed on corporate executives “ Optional” initiatives are moving quickly to “mandatory” Hardware refresh Network growth and challenges Specialized projects Compliance & Legislation Security Threats Disasters Business Continuity Increasing IT Workload Hardware Requirements 5
Why Outsource IT Infrastructure? Strategic Gain:  Entrust someone else to wear the pager:  count on SLAs but maintain CONTROL Ensure high availability and audited/tested security:  leverage the requirements of many Focus on your core competencies  while leveraging ours as well Establish a clear path to upgrade:  technology, people and process Adapt and scale easily:  mergers, acquisitions, geographic expansion… Mitigate risk through multiple infrastructures:  no single point of failure Financial Gain: Avoid high cost to build, maintain and predict operating expense without capital outlay (CapEx versus OpEx) Access technical resources that are often harder to afford and retain in-house Multiple internet providers, geo-diverse facilities, power, HVAC & fire suppression, network and computing infrastructure challenge ROI Most data centers do not populate server racks beyond 40-60% and typical utilization rates are between 7% and 15% in a non-virtualized environment.  (Gartner) Purchase flexibility enables you to optimize the solution for today and position your company for the future Make an apples-to-apples comparison: you can ’ t harness the  power, scale and security benefits  of top-tier IT infrastructure in-house without compromising ROI 6
The HDCS Difference: Data Center Platform We manage ALL layers of our infrastructure Facility Layer: 3 Tier III data centers in the US Compute Layer: HP c-7000 blades Storage Layer: 3Par T800 Series Network Layer: Cisco ASA 5500 and Fortinet Fortigate 310B for FW/IPS/IDS and F5 IP series for network load balancing Virtualization Layer: VMware products including ESX and Vsphere 4.0 Our platform is purpose-built Multiple data centers with private DWDM fiber connectivity SAS 70 Type II (SSAE 16), FISMA compliant, LEED certified data centers Data replication between facilities for DR/Back-up 7
Standard Network Topology vs. vStructure™  8 Internal Infrastructure HDCS  vStructure ™  Single Firewall Compute Layer Storage Layer Cisco ASA 5500 Series Firewall F5 Load Balancer Enterprise Class Virtualization Compute Layer Storage Layer
Security in a Multi-Tenant Environment We’ve built in layers of protection comprised of Network (physical and virtual), VMware and administrative security: Host Hardening:  all hosts are “locked down” per VMware best practices  Security Testing:  regular vulnerability scanning and penetration testing via 3 rd  party auditors Network Segmentation:  we segment customer configurations and traffic by locking down Layer 2’s physical and virtual network 9 VMware technologies create logical  security boundaries that provide isolation: Role based access control provides a clear separation of workflow for Virtual Infrastructure and security administrators Secure Applications and virtual machines with adaptive trust zones Continuous assessment of IT compliance state and automated remediation
vStructure™ Solutions We’re taking Colo to the Cloud. 10 Colocation Virtual Colocation Virtual Machine Solutions Virtual Resource Pool vWeb Includes: 1Mbs/Second Max Operating System vStructure Firewall vStructure Switching 1 vCPU 4GB RAM 100GB HD vApp Includes: 1Mbs/Second Max Operating System vStructure Firewall vStructure Switching 1 vCPU 8GB RAM 250GB HD Optional Add Ons: SAN Services  Cage:  Custom Quote Cabinet:  Custom Quote vColo Cabinet: Custom Quote PLUS... vWeb: 1Mbs/Second Max Operating System vStructure Firewall vStructure Switching 1 vCPU 4GB RAM 100GB HD vPool vCPU  RAM HD Firewall HDCS Services Backup - Offsite  Data Storage: Priced per GB  Disaster Recovery/ Replicated Site: Priced per GB  vEnterprise Includes: 3Mbs/Second Max Operating System vStructure Firewall vStructure Switching 2 vCPUs 16GB RAM 500GB HD HDCS Basic Care 24/7/365 Help Desk Basic Monitoring VM Management Optional Add Ons: SAN Services  Additional vCPU Additional RAM Additional HD HDCS Advanced Care
Horizon and The US Government Why is our relationship with the Government relevant to you?  Take a SAS70 Type II audit and pump it full of steroids... In October, 2010, Horizon was one of 12 companies awarded a Blanket Purchase Agreement (BPA) from the US General Services Administration (GSA) for IaaS to provide cloud services After 8-months of intensive US Government auditing of our infrastructure and delivery, we became the 1st provider to be awarded an Authority to Operate (ATO) A standard SAS 70 Type II audit contains 25-30 control points whereas the ATO assesses and  accredits 750+ control points for each “lot”  – Cloud Storage, Virtual Machines and Cloud Web Hosting Horizon’s extensive list of compliance achievements creates leverage for customers (FISMA, DIACAP, PCI, NIST 800-53, SSAE 16 Type 2…)  Horizon has achieved its SSAE 16 Type 2 for all 3 facilities   Management Controls: Assessment & Authorization Planning Risk Assessment System & Services Acquisition Operational Controls: Awareness & Training Configuration Management Contingency Planning Incident Response Maintenance Media Prevention Physical & Environmental Protection Personnel Security System & Information Integrity Technical Controls: Access Control Audit & Accountability Identification & Authentication System & Communications Protection 11
In Closing... We resolve common challenges for our clients: A Large International Restaurant Chain had audit compliance pains; didn’t have a working DR policy Needed a backup solution for 35TB of Storage We beat an internally proposed solution that was > $ 50% more expensive Corporate mandate required DR policy Horizon provides seamless backup & replication of their corporate server farm in 2 geographically disperse locations Department of Defense DoD needed secure environment under the DoD security measures Thousands of hits per day Required ability to scale on demand Need stable platform to scale to meet needs of overseas troops SaaS Provider to Cell Phone Users Was approaching end of life of hardware Did not have a test and development environment Requires secure, stable environment Requires ability to scale in support of growth of their customers   12
Thank you for your time today!
Ad

More Related Content

What's hot (20)

M. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for DistributionM. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for Distribution
Michael Josephs
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
Tom - Creed
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center Transformation
Arraya Solutions
 
Data Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformationData Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformation
Cisco Canada
 
Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
Netmagic Solutions Pvt. Ltd.
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Sutedjo Tjahjadi
 
Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
Cognizant
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
franc24
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
Steve Tester
 
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Symosis Security (Previously C-Level Security)
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
SolarWinds
 
ELLIPSE INFUSED MANAGED INFRASTRUCTURE SERVICES
ELLIPSE INFUSED MANAGED INFRASTRUCTURE SERVICESELLIPSE INFUSED MANAGED INFRASTRUCTURE SERVICES
ELLIPSE INFUSED MANAGED INFRASTRUCTURE SERVICES
Happiest Minds Technologies
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware
 
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
emagia
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital Enterprise
Kristof Breesch
 
Software defined networking
Software defined networkingSoftware defined networking
Software defined networking
Netmagic Solutions Pvt. Ltd.
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
ddcarr
 
M. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for DistributionM. Josephs - Reaching for the Clouds - Final for Distribution
M. Josephs - Reaching for the Clouds - Final for Distribution
Michael Josephs
 
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and AuditSukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Sukumar Nayak
 
VMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1aVMSDeploymentGuide_Extract1a
VMSDeploymentGuide_Extract1a
Tom - Creed
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
EnterpriseGRC Solutions, Inc.
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center Transformation
Arraya Solutions
 
Data Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformationData Center, Private Cloud/IT transformation
Data Center, Private Cloud/IT transformation
Cisco Canada
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
Netmagic Solutions Pvt. Ltd.
 
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend OpportunitiesPartnership to Capture Indonesia ERP Cloud Trend Opportunities
Partnership to Capture Indonesia ERP Cloud Trend Opportunities
Sutedjo Tjahjadi
 
Ensuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the CloudEnsuring PCI DSS Compliance in the Cloud
Ensuring PCI DSS Compliance in the Cloud
Cognizant
 
Software Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in IndiaSoftware Asset Management (SAM) Maturity landscape in India
Software Asset Management (SAM) Maturity landscape in India
franc24
 
imtechspherebrochure
imtechspherebrochureimtechspherebrochure
imtechspherebrochure
Steve Tester
 
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and KubernetesTaming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
Taming Multi-Cloud, Hybrid Cloud, Docker, and Kubernetes
SolarWinds
 
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud EraVMware: Innovate and Thrive in the Mobile-Cloud Era
VMware: Innovate and Thrive in the Mobile-Cloud Era
VMware
 
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...Enterprise Digital Assistants: How they can support you in your Credit, Colle...
Enterprise Digital Assistants: How they can support you in your Credit, Colle...
emagia
 
CSC Journey to the Digital Enterprise
CSC Journey to the Digital EnterpriseCSC Journey to the Digital Enterprise
CSC Journey to the Digital Enterprise
Kristof Breesch
 
Software Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing PresentationSoftware Association of Oregon Cloud Computing Presentation
Software Association of Oregon Cloud Computing Presentation
ddcarr
 

Viewers also liked (17)

Presentation jadi
Presentation jadiPresentation jadi
Presentation jadi
Taat Prasetya
 
Mars29bday
Mars29bdayMars29bday
Mars29bday
Akshath Dorai
 
Wolf Communication Portfolio
Wolf Communication Portfolio Wolf Communication Portfolio
Wolf Communication Portfolio
wolfcommindia
 
Set your \'Creative beast\' free
Set your \'Creative beast\' freeSet your \'Creative beast\' free
Set your \'Creative beast\' free
ahmedsalahmorsy
 
Set your "Creative beast" free
Set your "Creative beast" freeSet your "Creative beast" free
Set your "Creative beast" free
ahmedsalahmorsy
 
Resume tanzeel ul rehman
Resume tanzeel ul rehmanResume tanzeel ul rehman
Resume tanzeel ul rehman
Tanzeel Sahito
 
Project Bumblebee
Project BumblebeeProject Bumblebee
Project Bumblebee
projectbumblebee
 
Presentation jadi
Presentation jadiPresentation jadi
Presentation jadi
Taat Prasetya
 
Wolf Communication Portfolio
Wolf Communication PortfolioWolf Communication Portfolio
Wolf Communication Portfolio
wolfcommindia
 
Handleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijven
Handleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijvenHandleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijven
Handleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijven
Partners for Innovation BV
 
Rsume tanzeel ul rehman
Rsume tanzeel ul rehmanRsume tanzeel ul rehman
Rsume tanzeel ul rehman
Tanzeel Sahito
 
Building Biobased
Building BiobasedBuilding Biobased
Building Biobased
Partners for Innovation BV
 
PFI Presentation Building Biobased
PFI Presentation Building BiobasedPFI Presentation Building Biobased
PFI Presentation Building Biobased
Partners for Innovation BV
 
รายการวิทยุประเภทสารคดี
รายการวิทยุประเภทสารคดีรายการวิทยุประเภทสารคดี
รายการวิทยุประเภทสารคดี
Aimy Blythe
 
07 ภาคผนวก
07 ภาคผนวก07 ภาคผนวก
07 ภาคผนวก
She's Mammai
 
الاخوان المسلمون فى_فلسطين
الاخوان المسلمون فى_فلسطينالاخوان المسلمون فى_فلسطين
الاخوان المسلمون فى_فلسطين
Mousa El
 
Wolf Communication Portfolio
Wolf Communication Portfolio Wolf Communication Portfolio
Wolf Communication Portfolio
wolfcommindia
 
Set your \'Creative beast\' free
Set your \'Creative beast\' freeSet your \'Creative beast\' free
Set your \'Creative beast\' free
ahmedsalahmorsy
 
Set your "Creative beast" free
Set your "Creative beast" freeSet your "Creative beast" free
Set your "Creative beast" free
ahmedsalahmorsy
 
Resume tanzeel ul rehman
Resume tanzeel ul rehmanResume tanzeel ul rehman
Resume tanzeel ul rehman
Tanzeel Sahito
 
Wolf Communication Portfolio
Wolf Communication PortfolioWolf Communication Portfolio
Wolf Communication Portfolio
wolfcommindia
 
Handleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijven
Handleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijvenHandleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijven
Handleiding Duurzaam Verpakken voor Nederlandse e-commerce bedrijven
Partners for Innovation BV
 
Rsume tanzeel ul rehman
Rsume tanzeel ul rehmanRsume tanzeel ul rehman
Rsume tanzeel ul rehman
Tanzeel Sahito
 
รายการวิทยุประเภทสารคดี
รายการวิทยุประเภทสารคดีรายการวิทยุประเภทสารคดี
รายการวิทยุประเภทสารคดี
Aimy Blythe
 
07 ภาคผนวก
07 ภาคผนวก07 ภาคผนวก
07 ภาคผนวก
She's Mammai
 
الاخوان المسلمون فى_فلسطين
الاخوان المسلمون فى_فلسطينالاخوان المسلمون فى_فلسطين
الاخوان المسلمون فى_فلسطين
Mousa El
 
Ad

Similar to Hdcs Overview Final (20)

Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
MuhammadNaumanAkram1
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
webhostingguy
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
RapidScale
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
David Bustin
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Akhil Khandelwal
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
Giovanni Zanasca
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
Club Alliances
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
Vmwareir
 
Learn How SMBs Are Cutting IT Costs By Over 50%
Learn How SMBs Are Cutting IT Costs By Over 50%Learn How SMBs Are Cutting IT Costs By Over 50%
Learn How SMBs Are Cutting IT Costs By Over 50%
Lunarpages Internet Solutions
 
BSNL Presentation on their service portfolio
BSNL Presentation on their service portfolioBSNL Presentation on their service portfolio
BSNL Presentation on their service portfolio
pratikshapimparkar1
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the FutureGEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
akhilkhandelwal30
 
Remote Infrastructure Management Services
Remote Infrastructure Management ServicesRemote Infrastructure Management Services
Remote Infrastructure Management Services
Kryptos Technologies
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
Why the Cloud?
Why the Cloud?Why the Cloud?
Why the Cloud?
Carlos Martin Hernandez
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
Richard (Dick) Kaufman
 
Sify - IT Management Services
Sify - IT Management ServicesSify - IT Management Services
Sify - IT Management Services
webhostingguy
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
RapidScale
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
David Bustin
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Akhil Khandelwal
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
Giovanni Zanasca
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
How to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT StackHow to Monitor Digital Dependencies Across Your Modern IT Stack
How to Monitor Digital Dependencies Across Your Modern IT Stack
ThousandEyes
 
Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud Les DSI face au Tsunami Cloud
Les DSI face au Tsunami Cloud
Club Alliances
 
What's New at VMware?
What's New at VMware?What's New at VMware?
What's New at VMware?
Vmwareir
 
BSNL Presentation on their service portfolio
BSNL Presentation on their service portfolioBSNL Presentation on their service portfolio
BSNL Presentation on their service portfolio
pratikshapimparkar1
 
Introduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptxIntroduction to Symantec Endpoint Management75.pptx
Introduction to Symantec Endpoint Management75.pptx
Arrow ECS UK
 
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the FutureGEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
akhilkhandelwal30
 
Remote Infrastructure Management Services
Remote Infrastructure Management ServicesRemote Infrastructure Management Services
Remote Infrastructure Management Services
Kryptos Technologies
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
jeffirby
 
Ad

Recently uploaded (20)

How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell: Transforming Business Strategy Through Data-Driven Insights
Andrew Marnell
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Heap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and DeletionHeap, Types of Heap, Insertion and Deletion
Heap, Types of Heap, Insertion and Deletion
Jaydeep Kale
 
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager API
UiPathCommunity
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 

Hdcs Overview Final

  • 1. Horizon Data Center Solutions: Company & Capabilities Overview Horizon Data Center Solutions: Company & Capabilities Overview
  • 2. Horizon provides secure, stable and scalable IT Infrastructure for mission critical applications. Infrastructure-as-a-Service (IaaS) provider serving: Global 1000 US Federal Government Mid-market enterprises Solve technology problems through purpose-built cloud architecture ( vStructure™ ) Redundant Network Connectivity and Power Infrastructure Ability to Grow with Customer’s Success US Federal Government Tested Data Security Compelling ROI On June 28, 2011, became first IaaS provider to receive an Authority to Operate (ATO) under the US Government ’ s “ Cloud First ” cost savings initiative. Completed best-in-class audits, including SAS 70 Type II (SSAE 16) and NIST 800-53 accreditation (containing over 30 times the control objectives for a typical SAS 70 Type II audit). Our Story 2
  • 3. Our Operations We manage ALL layers of our infrastructure so we can ensure the quality and performance of our solutions. Founded in 2000 as Mareechi and merged with Horizon Data Center Solutions in 2009 We designed our infrastructure for mission critical managed hosting, cloud computing and colocation We operate 3 Tier III data centers (two in Dallas, one in Northern Virginia) We’ve established top-tier partnerships and invested in “best of breed” capability on your behalf 3
  • 4. Our Customer Experience We understand what matters most. Security: in today’s world, CIOs face more security and compliance challenges than ever. We ’ ve been accredited to provide IaaS solutions to US Federal Government branches that are hyper-sensitive to security concerns (ie: Homeland Security, US Department of Treasury, etc.). Stability: disaster recovery, business continuity and availability are core to your decision. Not only do we adhere to contractually defined SLAs, but we ’ re one of the few providers that actually proactively report to our clients on performance levels. Scalability: it ’ s critical that you choose a partner that can adapt and scale the solution. We customize solutions to your needs today and we anticipate (with you) requirements for the future. Accessibility: outsourcing doesn‘t mean you have to lose control or visibility. We simply provide security, stability and scalability while you maintain direct control of your IT operations. Administrative Ease: engaging a technology vendor shouldn‘t be tedious. We move fast and won ’ t burden your staff, budget and timeline with tedious contracting, billing and administrative hassles. Fiscal Viability: the ROI has to make sense. Pay for what you need, gain access to best-of-breed assets and forego cost- ineffective capital expenditures associated with building in-house. 4
  • 5. Common “ Pain Points ” Economic uncertainty driving CIOs to halt projects, freeze hiring and pile more responsibility on existing IT staff Focus on key applications 93% of SMBs that suffer significant data loss are out of business in 5 years (US Bureau of labor) Outages can cost SMBs over $12,000 per day (Symantec – 2011 SMB Disaster Recovery Survey) August 2011: Amazon EC2 outage takes down Foursquare, Instagram, Quora, Reddit… 50% of SMBs have no disaster recovery plan in place, even though 65% of them operate in areas vulnerable to natural disasters. (Symantec – 2011 SMB Disaster Recovery Survey) According to USA Today , security firm CardCops has been tracking a 20% year-over-year increase of hackers testing batches of payment card numbers to ensure they are still active Corporate governance, privacy and security issues have created an increase in regulation IT management must seriously consider how corporate data is used, accessed, archived, protected Increased accountability and scrutiny is being placed on corporate executives “ Optional” initiatives are moving quickly to “mandatory” Hardware refresh Network growth and challenges Specialized projects Compliance & Legislation Security Threats Disasters Business Continuity Increasing IT Workload Hardware Requirements 5
  • 6. Why Outsource IT Infrastructure? Strategic Gain: Entrust someone else to wear the pager: count on SLAs but maintain CONTROL Ensure high availability and audited/tested security: leverage the requirements of many Focus on your core competencies while leveraging ours as well Establish a clear path to upgrade: technology, people and process Adapt and scale easily: mergers, acquisitions, geographic expansion… Mitigate risk through multiple infrastructures: no single point of failure Financial Gain: Avoid high cost to build, maintain and predict operating expense without capital outlay (CapEx versus OpEx) Access technical resources that are often harder to afford and retain in-house Multiple internet providers, geo-diverse facilities, power, HVAC & fire suppression, network and computing infrastructure challenge ROI Most data centers do not populate server racks beyond 40-60% and typical utilization rates are between 7% and 15% in a non-virtualized environment. (Gartner) Purchase flexibility enables you to optimize the solution for today and position your company for the future Make an apples-to-apples comparison: you can ’ t harness the power, scale and security benefits of top-tier IT infrastructure in-house without compromising ROI 6
  • 7. The HDCS Difference: Data Center Platform We manage ALL layers of our infrastructure Facility Layer: 3 Tier III data centers in the US Compute Layer: HP c-7000 blades Storage Layer: 3Par T800 Series Network Layer: Cisco ASA 5500 and Fortinet Fortigate 310B for FW/IPS/IDS and F5 IP series for network load balancing Virtualization Layer: VMware products including ESX and Vsphere 4.0 Our platform is purpose-built Multiple data centers with private DWDM fiber connectivity SAS 70 Type II (SSAE 16), FISMA compliant, LEED certified data centers Data replication between facilities for DR/Back-up 7
  • 8. Standard Network Topology vs. vStructure™ 8 Internal Infrastructure HDCS vStructure ™ Single Firewall Compute Layer Storage Layer Cisco ASA 5500 Series Firewall F5 Load Balancer Enterprise Class Virtualization Compute Layer Storage Layer
  • 9. Security in a Multi-Tenant Environment We’ve built in layers of protection comprised of Network (physical and virtual), VMware and administrative security: Host Hardening: all hosts are “locked down” per VMware best practices Security Testing: regular vulnerability scanning and penetration testing via 3 rd party auditors Network Segmentation: we segment customer configurations and traffic by locking down Layer 2’s physical and virtual network 9 VMware technologies create logical security boundaries that provide isolation: Role based access control provides a clear separation of workflow for Virtual Infrastructure and security administrators Secure Applications and virtual machines with adaptive trust zones Continuous assessment of IT compliance state and automated remediation
  • 10. vStructure™ Solutions We’re taking Colo to the Cloud. 10 Colocation Virtual Colocation Virtual Machine Solutions Virtual Resource Pool vWeb Includes: 1Mbs/Second Max Operating System vStructure Firewall vStructure Switching 1 vCPU 4GB RAM 100GB HD vApp Includes: 1Mbs/Second Max Operating System vStructure Firewall vStructure Switching 1 vCPU 8GB RAM 250GB HD Optional Add Ons: SAN Services Cage: Custom Quote Cabinet: Custom Quote vColo Cabinet: Custom Quote PLUS... vWeb: 1Mbs/Second Max Operating System vStructure Firewall vStructure Switching 1 vCPU 4GB RAM 100GB HD vPool vCPU RAM HD Firewall HDCS Services Backup - Offsite Data Storage: Priced per GB Disaster Recovery/ Replicated Site: Priced per GB vEnterprise Includes: 3Mbs/Second Max Operating System vStructure Firewall vStructure Switching 2 vCPUs 16GB RAM 500GB HD HDCS Basic Care 24/7/365 Help Desk Basic Monitoring VM Management Optional Add Ons: SAN Services Additional vCPU Additional RAM Additional HD HDCS Advanced Care
  • 11. Horizon and The US Government Why is our relationship with the Government relevant to you? Take a SAS70 Type II audit and pump it full of steroids... In October, 2010, Horizon was one of 12 companies awarded a Blanket Purchase Agreement (BPA) from the US General Services Administration (GSA) for IaaS to provide cloud services After 8-months of intensive US Government auditing of our infrastructure and delivery, we became the 1st provider to be awarded an Authority to Operate (ATO) A standard SAS 70 Type II audit contains 25-30 control points whereas the ATO assesses and accredits 750+ control points for each “lot” – Cloud Storage, Virtual Machines and Cloud Web Hosting Horizon’s extensive list of compliance achievements creates leverage for customers (FISMA, DIACAP, PCI, NIST 800-53, SSAE 16 Type 2…) Horizon has achieved its SSAE 16 Type 2 for all 3 facilities   Management Controls: Assessment & Authorization Planning Risk Assessment System & Services Acquisition Operational Controls: Awareness & Training Configuration Management Contingency Planning Incident Response Maintenance Media Prevention Physical & Environmental Protection Personnel Security System & Information Integrity Technical Controls: Access Control Audit & Accountability Identification & Authentication System & Communications Protection 11
  • 12. In Closing... We resolve common challenges for our clients: A Large International Restaurant Chain had audit compliance pains; didn’t have a working DR policy Needed a backup solution for 35TB of Storage We beat an internally proposed solution that was > $ 50% more expensive Corporate mandate required DR policy Horizon provides seamless backup & replication of their corporate server farm in 2 geographically disperse locations Department of Defense DoD needed secure environment under the DoD security measures Thousands of hits per day Required ability to scale on demand Need stable platform to scale to meet needs of overseas troops SaaS Provider to Cell Phone Users Was approaching end of life of hardware Did not have a test and development environment Requires secure, stable environment Requires ability to scale in support of growth of their customers   12
  • 13. Thank you for your time today!