Run your business on a premium secure managed cloud.

The WHOA.com secure public cloud is deployed in a highly secure, best-in-class, multi-tenant infrastructure that provides customers their own private, self-contained virtual data centers. Each of these environments provide operating systems, applications, and additional services that meet your needs. We base our cloud offerings on our highly available enterprise cloud platform.

WHOA Data Center (WDC)
WHOA.com provides customers access to an enhanced Cloud Management Platform Portal which will provide customers the ability to manage their virtual environments, which is their WHOA Data Center. The WHOA Data Center (WDC) is a pool of cloud infrastructure resources and services including compute, memory, storage, bandwidth, firewall, load balancer, network security, and compliance. Within the WDC, the customer has the ability to manage and create Cloud Servers.

Secure Public Cloud Solutions

WHOA Data Center Standard Features for Secure Cloud

 

SecurityIncluded
Network Isolation  
Dedicated VMware vShield Edge Firewall  
Dedicated VMware vShield Edge Loadbalancer  
Palo Alto Perimeter Protection  
Site-to-Site VPN  
DDOS Protection  
DNS  
Secure VPN Access  
VXLANs  

  

ServiceIncluded
24x7x365 Basic VM Support  
24x7x365 Basic VM Monitoring  

 

 

INFRASTRUCTURE SERVICEIncluded
High Availability Included  
Bandwidth Included  
Scalable Flexpod Architecture  
VMware Platform  
SLA for Network Uptime 99.999%
SLA for Infrastructure Uptime 99.999%
Maximum Memory 64 GB
Maximum Cores 8
Maximum Disk Space N/A

 

COMPLIANCEIncluded
ISO 27001 Compliant  

 

WHOA.com Perimeter Firewall

We are serious about providing layered security and protection to our networks from all threats, many of which are exploits that are easily detected and prevented using a combination of antivirus, anti-spyware, and vulnerability protection - all provided by our Gartner MQ Visionary Perimeter Firewall.  Our WHOA Public Cloud Perimeter Firewall uses advanced detection mechanisms including a signature-based approach, which includes Intrusion prevention and Antivirus, plus a Layer 7 protocol analysis-based approach.

WHOA.com's network firewall provides proactive 24 x 7 updates on threats to enable a safe cloud environment and protect your mission critical applications. 

 

 

WHOA.com Perimeter Firewall Security Features

Antivirus:

  • Protects against viruses, worms, and trojans as well as spyware downloads.
  • Scans for an extensive variety of malware in executables, PDF files, HTML and JavaScript viruses, including support for scanning inside compressed files and data encoding schemes.
  • Inspects all of the listed protocol decoders for viruses, and generates alerts for SMTP, IMAP, and POP3 protocols while blocking for FTP, HTTP, and SMB protocols.

Anti-Spyware:

  • Main purpose is to detect malicious traffic leaving the network from infected clients.
  • Blocks attempts from spyware on compromised hosts trying to phone-home or beacon out to external command-and-control (C2) servers.
  • The antivirus profile applied to our security policy, will use the default action for every signature, as specified by Palo Alto Networks when the signature is created.

Vulnerability Protection:

  • Main purpose is to detect malicious traffic entering the network from infected clients.
  • Stops attempts to exploit system flaws or gain unauthorized access to systems, such as protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities.
  • The vulnerability protection profile applied protects clients and servers from all known critical severity threats.

Secure Cloud Architecture

 Scalable. High Availability. Redundancy.

WHOA.com Secure Cloud Service is delivered on highly available, fault-tolerant enterprise hardware from Cisco, NetApp, and Palo Alto. Every layer of infrastructure is redundant – having a minimum of two devices in each cloud infrastructure eliminating a single point of failure.

High Availability Configuration

  • Proven Reference Architecture
  • FlexPod Data Center Solution Architecture – A cooperative support model by industry leaders in networking, computing and storage to provide a platform that is efficient, streamlined, and solves the issues related to shared infrastructure while also providing flexibility and scalability. FlexPod architecture components include:
    • VMware vCenter: Provides automated workflows with a scalable and extensible platform.
    • Cisco UCS Platform: Provides embedded unified management that is integrated with VMware vCenter.
    • NetApp On Command: Provides a manager suite to automate, analyze, and control storage tasks and is integrated with VMware vCenter Server.

 

  • Every layer of hardware is redundant.
    • Network – All devices have 2 paths for redundancy. (Up to 160 Gb of throughput.)
    • Compute – All Servers, Chassis and Interconnects have 2 paths for redundancy. Additionally VMware HA features provide a hypervisor layer for high availability.
    • Storage – NetApp FAS Arrays utilize an active – active architecture that provides disk access and network / storage fabric redundancy. (Storage throughput of 40 GbE)
  • Configured and built with failover functionality.
  • Virtual machines will fail over and automatically restart in other cloud nodes in the event of a failure.