The Silver Lining In Your Cloud TM
 

Secure Cloud

Run your business on a premium secure managed cloud.

The Silver Lining In Your Cloud TM

Enjoy a Fully Managed, Secure Cloud Infrastructure

The Whoa Networks Secure Public Cloud is deployed in a highly secure, best-in-class, multi-tenant infrastructure that provides customers their own private, self-contained virtual data centers. Each of these environments provide operating systems, applications, and additional services that meet your needs. We base our cloud offerings on our highly available enterprise cloud platform.

INCLUDED WITH YOUR WHOA NETWORKS SECURE CLOUD SOLUTIONS

Access to 24x7 Support

Highly Available Infrastructure

Threat Observation Platform IDS/IPS

Hardened OS Linux & Windows

Bandwidth Included

Tier IV Data Centers Physical Security

WHOA Data Center (WDC)

Whoa Networks provides customers access to an enhanced Cloud Management Platform Portal which will provide customers the ability to manage their virtual environments, which is their WHOA Data Center. The WHOA Data Center (WDC) is a pool of cloud infrastructure resources and services including compute, memory, storage, bandwidth, firewall, load balancer, network security, and compliance. Within the WDC, the customer has the ability to manage and create Cloud Servers.

Whoa Networks Perimeter Firewall

We are serious about providing layered security and protection to our networks from all threats, many of which are exploits that are easily detected and prevented using a combination of antivirus, anti-spyware, and vulnerability protection – all provided by our Gartner MQ Visionary Perimeter Firewall. Our WHOA Public Cloud Perimeter Firewall uses advanced detection mechanisms including a signature-based approach, which includes Intrusion prevention and Antivirus, plus a Layer 7 protocol analysis-based approach.


WHOA’s network firewall provides proactive 24 x 7 updates on threats to enable a safe cloud environment and protect your mission critical applications.

shieldIcon-colored

Perimeter Firewall Security Features

Protects against viruses, worms, and trojans as well as spyware downloads.

Main purpose is to detect malicious traffic leaving the network from infected clients.

Stops attempts to exploit system flaws or gain unauthorized access to systems, such as protection against buffer overflows, illegal code execution, and other attempts to exploit system vulnerabilities.

Scans for extensive variety of malware in executables, PDF files, HTML and javascript viruses, including support for scanning inside compressed files and data encoding schemes.

Blocks attempts from spyware on compromised hosts trying to phone-home or beacon out to external command-and-control (C2) servers.

The vulnerability protection profile applied protects clients and servers from all known critical severity threats.

Inspects all of listed protocol decoders for viruses, and generates alerts for SMTP, IMAP, and POP3 protocols while blocking for FTP, HTTP, and SMB protocols.

The antivirus profile applied to our security policy, will use the default action for every signature as specified by Palo Alto Networks when the signature is created.

Secure Cloud Architecture

Scalable. High Availability. Redundancy.


Whoa Networks Secure Cloud Service is delivered on highly available, fault-tolerant enterprise hardware. Every layer of infrastructure is redundant – having a minimum of two devices in each cloud infrastructure eliminating a single point of failure.

High Availability Configuration

  • Proven Reference Architecture
  • FlexPod Data Center Solution Architecture – A cooperative support model by industry leaders in networking, computing and storage to provide a platform that is efficient, streamlined, and solves the issues related to shared infrastructure while also providing flexibility and scalability.
  • Configured and built with failover functionality
  • Virtual machines will fail over and automatically restart in other cloud nodes in the event of a failure.
  • Every layer of hardware is redundant
    • Network – All devices have 2 paths for redundancy. (Up to 160 Gb of throughput.)
    • Compute – All Servers, Chassis and Interconnects have 2 paths for redundancy. Additionally VMware HA features provide a hypervisor layer for high availability.
    • Storage – High Performance Storage Arrays utilize an active – active architecture that provides disk access and network / storage fabric redundancy. (Storage throughput of 40 GbE)
3D-secureCloud2

Secure Public Cloud Solutions

To Learn more about WHOA’s Fully Managed Secure Cloud Solutions, call us at 877-700-WHOA or complete the form to request a free consultation.