Secure Public Cloud

Run your business on a premium secure managed cloud.

Enjoy a Fully Managed, Secure Cloud Infrastructure

The WHOA.com Secure Public Cloud is deployed in a highly secure, best-in-class, multi-tenant infrastructure that provides customers their own private, self-contained virtual data centers. Each of these environments provide operating systems, applications, and additional services that meet your needs. We base our cloud offerings on our highly available enterprise cloud platform.


 

INCLUDED WITH YOUR WHOA.COM SECURE CLOUD SOLUTIONS 

Business Associate Agreement

24x7x365 White Glove Support

Threat Observation Platform IDS/IPS

Hardened OS Linux & Windows

Bandwidth Included

Tier IV Data Centers Physical Security

Incident Response

Security & Awareness Training

Certified Policies for HIPAA/OMNIBUS

Highly Available Infrastructure

WHOA Data Center (WDC)

WHOA.com provides customers access to an enhanced Cloud Management Platform Portal which will provide customers the ability to manage their virtual environments, which is their WHOA Data Center. The WHOA Data Center (WDC) is a pool of cloud infrastructure resources and services including compute, memory, storage, bandwidth, firewall, load balancer, network security, and compliance. Within the WDC, the customer has the ability to manage and create Cloud Servers.

WHOA Data Center Standard

Features for Secure Cloud

secureCloudTables

WHOA.com Perimeter Firewall

We are serious about providing layered security and protection to our networks from all threats, many of which are exploits that are easily detected and prevented using a combination of antivirus, anti-spyware, and vulnerability protection – all provided by our Gartner MQ Visionary Perimeter Firewall. Our WHOA Public Cloud Perimeter Firewall uses advanced detection mechanisms including a signature-based approach, which includes Intrusion prevention and Antivirus, plus a Layer 7 protocol analysis-based approach.


WHOA.com’s network firewall provides proactive 24 x 7 updates on threats to enable a safe cloud environment and protect your mission critical applications.

shieldIcon-colored

WHOA.com Perimeter Firewall Security Features

Protects against viruses, worms, and trojans as well as spyware downloads.

Main purpose is to detect malicious traffic leaving the network from infected clients.

Stops attempts to exploit system flaws or gain unauthorized access to systems, such as protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities.

Scans for extensive variety of malware in executables, PDF files, HTML and javascript viruses, including support for scanning inside compressed files and data encoding schemes.

Blocks attempts from spyware on compromised hosts trying to phone-home or beacon out to external command-and-control (C2) servers.

The vulnerability protection profile applied protects clients and servers from all known critical severity threats.

Inspects all of listed protocol decoders for viruses, and generates alerts for SMTP, IMAP, and POP3 protocols while blocking for FTP, HTTP, and SMB protocols.

The antivirus profile applied to our security policy, will use the default action for every signature as specified by Palo Alto Networks when the signature is created.

Secure Cloud Architecture

Scalable. High Availability. Redundancy.


WHOA.com Secure Cloud Service is delivered on highly available, fault-tolerant enterprise hardware from Cisco, and Palo Alto. Every layer of infrastructure is redundant – having a minimum of two devices in each cloud infrastructure eliminating a single point of failure.

High Availability Configuration

  • Proven Reference Architecture
  • FlexPod Data Center Solution Architecture – A cooperative support model by industry leaders in networking, computing and storage to provide a platform that is efficient, streamlined, and solves the issues related to shared infrastructure while also providing flexibility and scalability.
  • Configured and built with failover functionality
  • Virtual machines will fail over and automatically restart in other cloud nodes in the event of a failure.
  • Every layer of hardware is redundant
    • Network – All devices have 2 paths for redundancy. (Up to 160 Gb of throughput.)
    • Compute – All Servers, Chassis and Interconnects have 2 paths for redundancy. Additionally VMware HA features provide a hypervisor layer for high availability.
    • Storage – High Performance Storage Arrays utilize an active – active architecture that provides disk access and network / storage fabric redundancy. (Storage throughput of 40 GbE)
3D-secureCloud2

Secure Public Cloud Solutions

To Learn more about WHOA.com’s Fully Managed Secure Cloud Solutions, call us at 877-700-WHOA or complete the form to request a free consultation.