Scroll Top
Dubai, United Arab Emirates

Enterprise Application Platform

A tailor-made solution developed to run enterprise apps with optimized performance, comprehensive reliability and built-in availability.

 

Enterprise Application Platform

Critical enterprise applications are essential business continuity and prosperity. ERP is found in most enterprises, HIS in most hospitals, and MES in most manufacturing companies, all working in tandem with database services. Because these enterprise applications are crucial to business operations, they cannot afford slow response times, intermittent disruptions, and security threats. To avoid these issues that can cripple productivity, the underlying infrastructure platform must be equipped with components to ensure performance, availability, resiliency, and security.

Enterprise Application Platform Powered By HCI and aStor

INTACT Hyperconverged Infrastructure (HCI) continuously breaks new ground to meet the needs of critical enterprise applications. This robust infrastructure ensures performance, resiliency, and security at every layer of the platform.

In a typical enterprise setup, applications are distributed across different locations, including Core Data Centers, Remote Offices and Branch Offices (ROBO), Disaster Recovery (DR) sites, and off-premises Cloud Environments. INTACT HCI offers centralized management to enable seamless integrate and maintenance of workloads, regardless of their location.

Data storage is a key aspect of enterprise application platforms, often requiring the storage of various data types such as block, file, and object data. INTACT aStor, an advanced Enterprise Distributed Storage system, complements INTACT HCI to support a wide range of data types, ensuring the optimal performance of enterprise applications.

Platform Advantages

Inside-Out Security

INTACT HCI consolidates computing, storage, networking, and security to create a simplified enterprise application platform. This simplification reduces solution integration risk and minimizes the attack surface. The platform includes the built-in aSEC security operation center that uses virtual security appliances to protect public-facing applications and web services as well as critical internal databases. aSEC offers centralized security management, covering both internal and external traffic.

Efficient and Scalable Storage

INTACT HCI’s built-in block storage can be complemented by INTACT aStor—a unified, distributed storage system that supports block, file, and object storage. This combination of HCI and aStor allows for a flexible and efficient storage layer within the SDDC, opening up possibilities for a wider range of business scenarios. Both HCI and aStor run on commercial off-the-shelf (COTS) x86 servers, making them cost-effective, scalable, and easy to manage and maintain.

Local and Global Resiliency

Sangfor HCI provides local high availability (HA) through its data redundancy and integrated backup features. Additionally, Sangfor’s Disaster Recovery Management (DRM) solution offers off-site HA by replicating production workloads to the DR site. For scenarios that require the highest levels of availability, DRM allows HCI to stretch a cluster across two sites, establishing an Active-Active Data Center set up to ensure the best uptime for enterprise applications.

Platform Features & Capabilities

Security

aSEC 2.0 with Distributed IPS

  • Immediate Application Security: Apply security policies with a single click; no need for extra setup or configuration
  • Adaptive Security Policies: Security policies automatically adjust to changes in VMs.
  • Unified Management: Manage both security and cloud resources from a single interface.
  • Flexible and scalable: VM-level control granularity. Scale out with business.

VM Protection with INTACT Endpoint Secure

  • Built-in Endpoint Secure capabilities, including malware detection and removal, ransomware protection, asset management, vulnerability management
  • Automatic agent installation
  • Low resource consumption
  • File-level protection for Linux systems

 Threat Detection & Response with intact Cyber Command

  • Cyber Command detects threats via network traffic analysis and coordinates with INTACT Network Secure and Endpoint Secure to respond to various threats automatically or through manual intervention.
    • Ransomware: Takes snapshots of VMs to minimize data loss and enable recovery
    • Botnets: Works with the distributed firewall to quarantine compromised VMs
    • Cryptomining: Shuts down or suspends affected VM(s) to avoid illegal resource consumption

Disk Encryption Features

  • Provides secure encryption of VM disk images and snapshots.
    • Encryption algorithm: AES-256 and SM4
    • Range: One encryption module per VM
    • Key: One key per VM

Contac Us for Inquiry