Friday, November 21, 2008

IntelliSecurity Managed Firewall Service

Your firewall is the most critical line of defense protecting your network from hackers and other network threats. If you don’t have the internal resources to build and manage a word-class firewall solution, or would like to streamline efficiencies so your critical IT resources can focus on core business initiatives, Verio’s IntelliSecurity Managed Firewall Service offers the end-to-end solutions you need – with several cost-effective packages to choose from (see charts below).
Managed Firewall Service Components
IntelliSecurity Managed Firewall Service combines our superior technology, configuration and management expertise, with our proven processes and procedures to provide your network with the best defense possible. Learn more about each component of our managed firewall solution below, or contact us for more information.
FirewallThe core of each managed firewall service package is an industry-leading firewall from NetScreen, ISS or Check Point/Nokia. These firewall security appliances can be housed within our NTTA data center, or we can provide this service for devices located at your facility.
24x7 Security Monitoring & Device Management Our certified security technicians monitor and manage the health and performance of the firewall platform and analyze firewall logs and security events around the clock. All patches and firmware are promptly installed by our technicians and they will immediately notify you of outages or severe threats so firewall changes can be expedited under your direction.
Managed Services Customer PortalThis secure portal gives your IT staff real-time access to the most important information regarding your security management profile: security alert monitoring, device status and firewall policy change requests and tracking.
Security Operations Centers (SOCs)Our security teams operate out of our state-of-the-art, physically hardened SOCs. These centers provide the secure, highly available and redundant environments necessary to monitor and manage your mission-critical systems and firewall security appliances.
X-Force Protection SystemThis proprietary technology collects data from your firewall logs and then converts the aggregated data into a normalized stream of events so they can be prioritized using advanced correlation.
Data Back-up & RestorationYour firewall log data is accessible to you through our customer portal for 60 days. After that time, the log data is archived using physical back-up media. These archives are available to you for restoration for a specific time period defined by your service level agreement.
Multiple Managed Firewall Service Packages to Match Your Unique Needs
Service Package
Firewall Platform*
IntelliSecurity Check Point Level I
Check Point Nokia IP200 Series
IntelliSecurity Check Point Level II
Check Point Nokia IP300 Series
IntelliSecurity Check Point Level IIA
Check Point Nokia IP300 HA Series
IntelliSecurity Check Point Level III
Check Point Nokia IP300 Series
IntelliSecurity Check Point Level III
Check Point Nokia IP300 Series
IntelliSecurity Check Point Level IIIA
Check Point Nokia IP300 Series
IntelliSecurity Check Point Level IV
Check Point Nokia IP500 Series
IntelliSecurity Check Point Level IVA
Check Point Nokia IP500 HA Series
IntelliSecurity NetScreen Level I
NetScreen 5
IntelliSecurity NetScreen Level II
NetScreen 5
IntelliSecurity Protection Service I
ISS Proventia M10
IntelliSecurity Protection Service II
ISS Proventia M30
IntelliSecurity Protection Service III
ISS Proventia M50
*Subject to change. Please confirm with your sales representative.
Compare and Contrast Our Managed Firewall Service Packages
The charts below outline the distinguishing services included in each package, as well as whether certain features like anti-virus, anti-spam and VPN client software is included, and how many VPN connections are included.

IntelliSecurity Managed Security Services:

Network security and risk management have never been more important. While hosting critical applications in a hardened data center will protect them from physical threats like fire and water, it cannot protect them from malicious attacks that bypass your firewall. To fully protect and maintain the integrity of your network, applications and data, you need Verio's multi-layered managed security services.
A Comprehensive Approach to Managed Security Services
Our IntelliSecurity managed security services offer a comprehensive strategy for ensuring the integrity of your network. Different types of protection are deployed at multiple layers – the perimeter, network, host, application and data layers – to build a series of barriers that detect, prevent and defend against specific threats.
IntelliSecurity managed security services offers you all of the following benefits:
24x7x365 management and monitoring of security devices by certified security experts
Real-time security intelligence that enables proactive, preemptive security posturing
Global visibility across a variety of security platforms
A constantly evolving array of technologies and technical disciplines
To learn more about our managed security services, please visit our Managed Firewall and Managed Intrusion Protection pages, or contact us today at 800-269-3300.
More Reasons to Choose Verio for Managed Security Services
Deep Hosting and Managed Services Experience – As a global Internet technology and web hosting provider, thousands of customers trust us to manage their mission-critical applications within NTTA data centers. Now we're extending our network security expertise to you.
Unparalleled Security Competence at a Fraction of the Cost – Our highly trained managed security services technicians have the hands-on experience you need without the expense or challenge of recruiting and retaining a world-class IT security organization in-house.
Risk-Sharing Across Customer Base – As an "always-on" global security provider, we have advance warning of new vulnerabilities and early access to information on countermeasures. We preempt security threats for many of our customers before they become a problem.
Business Continuity – Our managed security services extend the physical security of our data centers into the network. Our exceptional security analysts will manage and monitor your network traffic 24x7x365, and can restore full services in less than an hour.
Reliability of a Financially Strong Technological Leader – Verio is a global force. We provide a level of stability and technological leadership unsurpassed in the world today. We are strongly positioned to provide you with the IT solutions you need well into the future, so you can count on us to be there when you need us most.

Data Storage Solutions

Data Center Backup and Restore Services
Offers three fully managed services to meet your needs:
Fully managed server backup and restore solution lets you backup as little or as much data as you require
We take responsibility for ensuring the successful backup of your company data
You can initiate your own restores
Best of breed hardware and software solutions with guaranteed Service Level Agreements
Data can be saved for 14 or 28 days within the data center or for long term archiving Offsite Vaulting is available
Offsite Vaulting
Offers offsite tape vaulting if you need the added protection of an extended retention period for your data
Makes a copy of your data to a duplicate tape which is stored at an offsite location
Includes tape media, pickup and offsite storage of your tapes
Database Backup
Offers three database backup options to meet your needs for database availability:
Offline Database Backup with "cold" backup for all database (DBS) platforms. You stop the database during the backup and your database cannot be accessed.
Online Database Backup offers "hot" database backups for Microsoft databases and "warm" backups for all other database types. The database is running and accessible during the backup but does have some performance degradation.
Mirrored Online Database Backup offers "active online" database backups for Microsoft databases and "hot" backups for all other database platforms. The database is running and accessible during the backup and exhibits no performance degradation.
Storage Area Network (SAN) and Storage Area Network High Availability (SANHA)
NTT America takes responsibility for providing the continuous availability and management of your storage environment, RAID 5 and RAID 10 configurations with up to 99.999% availability, and guaranteed service level performance.
SAN options include:
Standard SAN Service gives you access to managed storage volumes via two single-port HBAS. Storage volumes are available in increments of 64GB with an initial minimum of 128GB. Each storage volume is configured as a RAID 5 device and has access to a pool of online global hot spares.
Enhanced SANHA Service gives you a fully redundant, highly available connection to the SAN using dual port HBAS in your host computer. Storage volumes are available in increments of 64GB with an initial minimum of 128GB. Each storage volume is configured as a RAID 0+1 device with data mirrored across two separate disks within the same storage unit.
Custom Storage Services are available to meet any custom storage needs you many have. Our experienced Storage Engineers can work with you to design a solution that meets your needs.
To learn more about putting Verio's Data Storage Solutions Services to work for you, contact one of our collaboration consultants at 800-269-3300.

Data Storage Solutions

Data Storage Solutions
Critical data is your company's asset which you cannot afford to lose. However, building your proprietary storage facility to preserve such data may not be most cost effective solution to your problem.
Verio's suite of fully managed storage solutions meet your data protection requirements and eliminate costly capital outlay. These outsourced services feature:
Our on-site personnel
Best-of-breed hardware and software systems
Proven technologies, processes and procedures
Cost-effective and flexible services
At Verio, the following powerful managed storage service suites are available:
Data Center Backup and Restore Services – Periodical data backup at your choice of retention period and data size
Offsite Vaulting – Copying of your data to a duplicate tape for offsite storage to extend retention period for your data
Database Backup – Three backup options of Offline, Online, and Mirrored accommodating your database availability needs
Storage Area Network (SAN) and Storage Area Network High Availability (SANHA) — Enterprise-class SAN solution with convenience of outsourced storage environment with guaranteed data availability
To learn more about putting Verio's Data Storage Solutions Services to work for you, contact one of our collaboration consultants at 800-269-3300.

HP ProLiant Servers

HP ProLiant DL140-G3 Base Bundle
Dual-Core Intel Xeon CPU
1 GB RAM
2 x 80GB SATA Hot-Plug Drives
HP ProLiant DL380-G5 Base Bundle
Quad-Core Intel Xeon CPU
2 GB Memory
2 x 36GB (3G) SAS Hot-Plug Drives
RAID Controller with Battery-backed Cache (BBWC)
Redundant Power Supplies
HP ProLiant DL385-G2 Base Bundle
Dual-Core AMD CPU
2 GB Memory
2 x 36GB (3G) SAS Hot-Plug Drives
RAID Controller with Battery-backed Cache (BBWC)
Redundant Power Supplies
HP ProLiant DL580-G4 Base Bundle
Dual-Core 64-bit Intel Xeon CPU
4 GB Memory
2 x 36GB (3G) SAS Hot-plug Drives
RAID Controller with Battery-backed cache (BBWC)
Redundant Power Supplies
HP ProLiant DL585-G2 Base Bundle
2 x Dual-Core AMD CPU
4 GB Memory
2 x 36GB (3G) SAS Hot-Plug Drives
RAID Controller with Battery-backed Cache (BBWC)
Redundant Power Supplies
HP ProLiant Cluster Base Bundle
Available on Microsoft Windows Server 2003 with either:
Microsoft Cluster Server (MSCS)
VERITAS Cluster Server
2 x DL380-G4 Server with:
Intel Xeon Xeon CPU (with EM64T)
1GB RAM
2 x 36GB SCSI Hot-Plug Drives
Cluster Storage Enclosure: Modular Smart Array 500-G2, with 5 x 36GB SCSI Hot-Plug Drives
Dedicated Domain Management Servers (Active Directory Services)
HP Proliant Servers from Verio
Verio proudly offers Hewlett-Packard's newest Proliant server solutions, now offering the robustness and reliability of multi-core processors and Serial Attached SCSI (SAS) storage as standard architectures on most models. Verio has forged a strong relationship with Hewlett-Packard, one of the industry's most respected technology solution providers, as part of our strategy to provide the most resilient and performance focused solutions available.Why Choose an HP Proliant Server from Verio?
Our HP Proliant Servers are certified to operate with Microsoft Windows Server 2003 (R2), and Red Hat Enterprise Linux 4.0 operating systems.
Our HP Proliant Servers offer standard pre-installed software for all Microsoft Windows Server 2003 packages: IIS 6, POP3, Remote Desktop, Windows 2003 Support Pack, Windows 2003 Resource Kit, Windows 2003 Critical updates (as per date of server order), and HP Support pack.
Our HP Proliant Servers offer standard pre-installed software for all Red Hat Enterprise Linux 4.0 packages, including applications that come pre-bundled with the Red Hat Enterprise Linux operating system.
Our HP Proliant Servers can be configured and/or modified to meet your business requirements.
To learn more about putting Verio Managed Hosting solutions to work for you, contact one of our collaboration consultants at 800-269

Sun Servers

Why Choose a Sun Server from Verio?
Sun servers from Verio are certified to operate with Solaris 10, one of the computing industry’s most tested and feature-rich operating systems.
Sun servers offer standard pre-installed software and come with mirrored boot drives for the ultimate in resiliency and performance.
Sun servers can be configured and/or modified to meet your business requirements.
Sample Pre-configured Sun Server Packages:Here are just a few of our options; each can be modified to meet your specific requirements.
Sun V245 Base Bundle
1.5 GHz UltraSPARC IIIi CPU
1 GB Memory
2 x 73 GB SAS Hot-Plug Drives
Hardware RAID Controller
Redundant Power Supplies
Solaris 10
Sun T1000 Base Bundle - NEW !!!
1 x 6-core 1.0 GHz/3-MB UltraSPARC T1 CPU
2 GB Memory
2 x 73 GB SAS Hot-Plug Drives
Hardware RAID Controller
Solaris 10
Sun V245 Cluster Base Bundle
2 x Sun Fire V245 servers
1 x 1.5 GHz UltraSPARC IIIi CPUs
1 GB Memory
2 x 73 GB SAS Hot-Plug Drives
Hardware RAID Controller
Solaris 10
VERITAS Foundation Enterprise HA for Oracle
Cluster Storage: 2 x Sun StorEdge 3320 SCSI Arrays: each with 5 x 146 GB SCSI Drives & dual Ultra320 SCSI RAID controllers
Sun V445 Base Bundle
2 x 1.6 GHz UltraSPARC IIIi CPU
4 GB Memory
4 x 73 GB SAS Hot-Plug Drives
Hardware RAID Controller
Redundant Power Supplies
Solaris 10
Sun T2000 Base Bundle - NEW !!!
1 x 8-core 1.0 GHz/3-MB UltraSPARC T1 CPU
8 GB Memory
2 x 73 GB SAS Hot-Plug Drives
Hardware RAID Controller
Redundant Power Supplies
Solaris 10
Sun V445 Cluster Base Bundle
2 x Sun Fire V445 servers
2 x 1.6 GHz UltraSPARC IIIi CPUs
4 GB Memory
4 x 73 GB SAS Hot-Plug Drives
Hardware RAID Controller
Solaris 10
VERITAS Foundation Enterprise HA for Oracle
Cluster Storage: 2 x Sun StorEdge 3320 SCSI Arrays: each with 5 x 146 GB SCSI Drives & dual Ultra320 SCSI RAID controllers

Thursday, November 20, 2008

Type of Servers

Types of Servers
Servers do not really have ``types''. A server can be a primary for some zones and a secondary for others, or it can be only a primary, or only a secondary, or it can serve no zones and just answer queries via its ``cache''. Previous versions of this document referred to servers as ``master'' and ``slave'' but we now feel that those distinctions -- and the assignment of a ``type'' to a name server -- are not useful.
Caching Only Server
All servers are caching servers. This means that the server caches the information that it receives for use until the data expires. A Caching Only Server is a server that is not authoritative for any zone. This server services queries and asks other servers, who have the authority, for the information needed. All servers keep data in their cache until the data expires, based on a TTL (``Time To Live'') field which is maintained for all resource records.
Remote Server
A Remote Server is an option given to people who would like to use a name server from their workstation or on a machine that has a limited amount of memory and CPU cycles. With this option you can run all of the networking programs that use the name server without the name server running on the local machine. All of the queries are serviced by a name server that is running on another machine on the network. A host which has an /etc/resolv.conf file listing only remote hosts, and which does not run a name server of its own, is sometimes called a Remote Server (because the actual server is remote?) but more often it is called simply a DNS Client. This kind of host is technically not a ``server'', since it has no cache and does not answer queries.
Slave Server
A Slave Server is a server that always forwards queries it cannot satisfy from its cache, to a fixed list of forwarding servers instead of interacting with the name servers for the root and other domains. The queries to the forwarding servers are recursive queries. There may be one or more forwarding servers, and they are tried in turn until the list is exhausted. A Slave and forwarder configuration is typically used when you do not wish all the servers at a given site to interact with the rest of the Internet servers. A typical scenario would involve a number of workstations and a departmental timesharing machine with Internet access. The workstations might be administratively prohibited from having Internet access. To give the workstations the appearance of access to the Internet domain system, the workstations could be Slave servers to the timesharing machine which would forward the queries and interact with other name servers to resolve the query before returning the answer. An added benefit of using the forwarding feature is that the central machine develops a much more complete cache of information that all the workstations can take advantage of. The use of Slave mode and forwarding is discussed further under the description of the named bootfile commands.
There is no prohibition against declaring a server to be a slave even though it has primary and/or secondary zones as well; the effect will still be that anything in the local server's cache or zones will be answered, and anything else will be forwarded using the forwarders list.

Server Types
This list, courtesy of serverwatch.com, categorizes the many different types of servers
used in the marketplace today. Click on the server category you'd like to know more about, and you will be taken directly to a serverwatch.com page that provides additional information and resources.
Server Platforms
A term often used synonymously with operating system, a platform is the underlying hardware or software for a system
and is thus the engine that drives the server.
Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing territory between database servers and the end user, and they often connect the two.
Audio/Video Servers
Audio/Video servers bring multimedia capabilities to Web sites by enabling them to broadcast streaming multimedia content.
Chat Servers
Chat servers enable a large number of users to exchange information in an environment similar to Internet newsgroups that offer real-time discussion capabilities.
Fax Servers
A fax server is an ideal solution for organizations looking to reduce incoming and outgoing telephone resources but that need to fax actual documents.
FTP Servers
One of the oldest of the Internet services, File Transfer Protocol makes it possible to move one or more files securely between computers while providing file security and organization as well as transfer control.
Groupware Servers
A groupware server is software designed to enable users to collaborate, regardless of location, via the Internet or a corporate intranet and to work together in a virtual atmosphere.
IRC Servers
An option for those seeking real-time discussion capabilities, Internet Relay Chat consists of various separate networks (or "nets") of servers that allow users to connect to each other via an IRC network.
List Servers
List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the public or one-way lists that deliver announcements, newsletters, or advertising.
Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks (via LANs and WANs) and across the Internet.
News Servers
News servers act as a distribution and delivery source for the thousands of public news groups currently accessible over the USENET news network.
Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server (typically another server on the Web) to filter requests, improve performance, and share connections.
Telnet Servers
A Telnet server enables users to log on to a host computer and perform tasks as if they're working on the remote computer itself.
Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving it across the network to a user's Web browser. This entire exchange is mediated by the browser and server talking to each other using HTTP. Also read ServerWatch's Web Server Basics article.