Cloud FAQs

What are the key benefits of cloud computing?
What is virtualization?
What operating system do you support?
We need to analyze the costs we will save by moving our applications a cloud environment. Can you tell us what those cost savings might be?
What is considered multi-tenancy structure in a cloud hosting environment, and do you offer that?
For secure cloud operations, data encryption is necessary. What is your protocol for data encryption?
Apart from cloud hosting, what other services do you provide?
What is your knowledge of Centralized Management Platforms as it applies to Cloud services?
What kind of on-going monitoring is provided once cloud solutions are deployed?
What is vendor lock-in as it applies to cloud computing and what is your protocol?

Cloud Computing: Key Benefits

What are the key benefits of cloud computing?

  • On-demand capacity and cost effective solution for rapid elasticity and scalability.
  • On-demand provisioning and automatic deprovisioning.
  • Application Programming Interfaces (APIs).
  • Pay-as-you-go model.
  • Load balancing.

Virtualization

What is virtualization?

Virtualization separates resources and services from the physical environment. Simply put, virtualization in cloud computing has three basic characteristics:

  • Partitioning: Application and operating systems are separated.
  • Isolation: Each customer’s virtual machine is isolated from the host and other customers’ virtual machines. Data crashing in one virtual machine does not affect the performance of other virtual machine. Moreover, each customer is protected from other customers’ data.
  • Encapsulation: A virtual machine is stored as a separate file.

Operating Systems

What operating system do you support?

We provide Linux Cloud Hosting Solution as well as Windows Cloud Hosting Solution.

Adoption Model

We need to analyze the costs we will save by moving our applications to a cloud environment. Can you tell us what those  cost savings might be?

A rational economic approach to cloud adoption means doing detailed analysis of current costs (both fixed and variable) such as:

  • Server costs: Hardware costs.
  • Storage costs: Storage Area Network (SAN).
  • Network costs: Internet bandwidth requirements.
  • Back-up costs: Back-up of critical data and offsite storage costs.
  • Disaster recovery costs: Cloud service provider’s protocol for disaster recovery must be discussed before eliminating this cost completely.
  • Data center costs: Number of applications that can be moved to a cloud environment.
  • Software maintenance costs: Costs to run and maintain licenses for software required for specific applications.

Multi-Tenancy Structure

What is considered multi-tenancy structure in a cloud hosting environment, and do you offer that?

Localweb.com’s hosting infrastructure is designed from the ground up to be a secure, reliable, and robust multi-tenant infrastructure, where individual customers (whether US Government or commercial) are kept securely isolated from one another depending on their SLA contracts with Localweb.com.

Data Encryption

For secure cloud operations, data encryption is necessary. What is your protocol for data encryption?

  • Localweb.com implements several layers of encryption in its day-to-day operations, and its hosting and Cloud operations, including:
  • SSL encryption for web site certificates.
  • TLS encryption for mail servers.
  • Encrypted VPN tunnels.
  • Secure encrypted remote desktop connections (Windows platforms).
  • Secure encrypted SSH connections (Linux platforms).
  • Secure file transfer (SFTP).
  • Secure two-factor authentication using hardware tokens and one-time passwords.
  • Encryption of removable storage media such as USB devices for offsite storage.
  • Mobile device encryption for laptops.

Other Services

Apart from cloud hosting, what other services do you provide?

Localweb.com provides the following services:

  • Managed and Dedicated Hosting Services
  • Virtual Hosting Services (small web-sites)
  • Email services (Microsoft Exchange, POP3, IMAP)
  • IaaS Cloud Hosting Services (FedRAMP in process)
  • Secure FISMA compliant hosting services for U.S. Government Customers
  • Secure PCI-DSS Compliant Hosting Services for E-commerce Customers
  • Website design and management services
  • Internet and IT Security Services, such as monitoring, IDS, firewalls, SIEM (Security Information and Event Management) tools, Forensics, etc.


What is your knowledge of Centralized Management Platforms as it applies to Cloud services?

Localweb.com maintains a centralized and integrated management approach. Localweb.com ’s centralized platforms include the following elements and capabilities:

  • Centralized SIEM (Security Information and Event Management) log analysis and alerting
  • Centralized IT security infrastructure such as IDS (Intrusion detection systems)
  • Centralized network infrastructure management (routers, switches, firewall) as far as possible
  • Centralized health monitoring (server health, application health)
  • Centralized bandwidth usage / MRTG monitoring
  • Centralized support / help desk ticketing system

Monitoring

What kind of on-going monitoring is provided once Cloud solutions are deployed?
Some common capabilities that we provide are:

  • MRTG bandwidth monitoring for usage levels and spikes
  • Intrusion Detection Systems (IDS)
  • SIEM log analysis tools for near real time analysis and alerting
  • Capability to implement a client’s own virtual switches and firewalls per customer or system, as a “virtual data center”

Vendor Lock-in

What is vendor lock-in as it applies to cloud computing and what is your protocol?

Vendor lock-in refers to creating conditions within the cloud environment that make existing cloud customers moving to a new host a difficult process. Some cloud hosting services do that so they can hold onto their existing cloud customers. This may be achieved via security controls, such as limiting access to customer data. At Localweb.com we have a protocol of no vendor lock-in.

To prevent valuable data being lost and to avoid unnecessary system downtime and hence loss of revenue data, migration needs to be planned carefully. For these reasons, we have to coordinate data migration with the customers’ schedules and time table. In order for migration of cloud data to be a seamless process for both the cloud hosting provider and the end customer, sufficient time needs to be allotted for the completion process.