Integration
[KA|C1] “Package name” includes the implementation of necessary analysis, deployment and test procedures in order to provide all services in the service package in the customer environment.
It is a secure, accessible, traceable backup and disaster recovery solution to prevent data loss and ensure ransomware resistance.
Product Scope 1
Product Scope 2
Product Scope 3
AIM
USE
Basic
Advanced
[KA|C1] “Package name” includes the implementation of necessary analysis, deployment and test procedures in order to provide all services in the service package in the customer environment.
It is a support operation to be operated through the ticket system in case of problems occurring in the backup / DR environment that is actively used in environments within the scope of managed services and in case of existing configuration change needs.
The health status of the actively used backup/DR environment within the scope of the managed service is checked regularly, the backups are checked at regular intervals, and DR tests are performed. Defender for Cloud and OS are monitored, reported and alarmed.
Within the scope of the agreement, consultancy services are provided on the creation of a periodic backup schedule, the analysis of the existing license profile, the active use of the products within the license, and the creation of medium and long-term backup plans within the scope. Regular reporting of services used within the scope of managed services is made.
Service for monitoring, logging and periodic reporting of Azure subscriptions, resource pools, services and costs of services.
In addition to the basic package;
Use Case Scenario
Current structure:
XXX company has an information technology structure that keeps all workloads on-premise, that is, on its own servers. It has an accounting application and database servers as workload. It also hosts a 3-server virtual machine structure where manufacturing confidential documents are kept.
Risks:
Accounting application and database are extremely critical for the company and require continuity with minimum RTO and RPO. Other servers contain confidential information about production. This information should not leak out and should be kept as a trade secret.
Expectations:
High-level server and redundancy security also means quick disaster recovery when needed. XXX company wants to protect application and database servers and data against many threats such as malware (ransomware, etc.)
Solution
XXX decides to use the package that meets the expectations with its solutions offered by CloudCan.
Company XXX decides to use ASR (Azure Site Recovery) for minimum data loss, fast accounting application and database recovery. Site Recovery is a native disaster recovery-as-a-service (DRaaS) solution. With ASR, it has also included and protected its servers related to production, which includes risk. It has benefited from Azure Arc to use ASR effectively and efficiently.
In the 2019 Magic Quadrant for Disaster Recovery as a Service, Microsoft was named a leader in DRaaS, based on integrity of vision and ability to implement
XXX company started using Defender for Cloud to protect workload and data kept in Azure against malware, infiltration and similar malicious actors and attacks. With the installation of the EDR solution that comes with Defender for Cloud, servers gained capabilities such as continuous protection against potential or actual attacks, vulnerability analysis.
XXX has a solution that enables the analysis of security posture, policies that follow standards such as Azure Security Benchmark, NIST or ISO 27001, security monitoring, alarms, notifications and attack patterns with machine learning that comes with Defender for Cloud. Similarly, with Defender for Cloud, it was possible not only to constantly control the servers, but also to scan their backed up and storages.
In addition to protecting servers and data with ASR, XXX company backs up and protects data both with its own existing environments and with the Veeam infrastructure within Vodafone. Veeam is proven, easy to use and maintain, and can be used in many environments (on-prem or cloud). According to Gartner data, the upper right quadrant is also included.
XXX has also started to use the Azure Update Management solution to protect the security and application infrastructure of the servers against emerging threats, following the Security best practices. In this way, it has taken precautions against new threats and is protected against threats that may occur in vulnerabilities in the application infrastructure.
CloudCan took its place at the Izmir Technology Summit! As Microsoft Business Partner of the Year, we talked to the invaluable CIOs of companies in and around Izmir about their new investments and digital transformations.
The content of our event, which we held as CloudCan and Windows 11 team, took place in the CIO Update magazine! Thank you again to all our valued guests who were with us.
CEDO, one of Europe’s leading manufacturers of household disposable goods, supported sustainability in its companies with Contact QR!
Cloud Technology?