8K Miles' Response to RFP - NCPA
8K Miles' Response to RFP - NCPA
8K Miles' Response to RFP - NCPA
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
2. Reengineering applications <strong>to</strong> be elastic. An example of this service is <strong>to</strong> make sure that<br />
the user sessions are not affected when application servers are added or removed based<br />
on load.<br />
3. Identify steady-state utilization of instances after reengineering and purchase reserved<br />
instances <strong>to</strong> avail 30–50% cost savings over on-demand instances.<br />
1. Decompose relational databases and use less expensive and more effective solutions such<br />
as SimpleDB or DynamoDB where applicable.<br />
<strong>8K</strong>Miles also provide a set of Value-Added Solutions that can be cus<strong>to</strong>mized <strong>to</strong> Region 14 and<br />
<strong>NCPA</strong> members as described the next subsection.<br />
<br />
<br />
<strong>8K</strong>Miles will provide Region 14 and <strong>NCPA</strong> members value-added solutions that leverage the<br />
AWS platform. Our unique, valued-added solutions have been designed <strong>to</strong> provide enterpriselevel<br />
cloud security, mobile collaboration, and large-scale data analytics solutions that can be<br />
tailored <strong>to</strong> Region 14 and <strong>NCPA</strong>-specific member’s cost, security profile, and technical<br />
requirements. Due <strong>to</strong> our ability <strong>to</strong> highly tailor these solutions, pricing will be quoted based on<br />
the <strong>NCPA</strong> specific requirements.<br />
<br />
<br />
In this era of on-demand mobile computing, there are more and more requests for making sure<br />
that the distribution of information (personal information and otherwise) on<strong>to</strong> mobile devices is<br />
protected and secure. Whether we are talking about personal information like social security<br />
numbers, credit card information, or addresses and phone numbers; about personal health<br />
information exchanged between physicians and patients; or even about homework assignments,<br />
student projects, and grades at all levels of education, the security of our own data is critically<br />
important.<br />
<strong>8K</strong>Miles has designed, developed, and deployed a packaged secure virtual private cloud (S-VPC)<br />
framework that provides assurance of information protection (see Figure 4). As described in<br />
subsection 5.7.1, the Amazon VPC lets cus<strong>to</strong>mers provision a private, isolated section of the<br />
AWS Cloud. We have integrated a front-end user layer using a Sophos unified threat<br />
management suite. The suite provides firewall services, intrusion protection/detection services,<br />
secure virtual private network (VPN) connectivity, packet filtering, and web application firewall<br />
protection not available via AWS standard offerings. This front-end protects against denial-ofservice<br />
attacks, worms, and hacker exploits; secures email from spam and viruses; filters web<br />
browsing; and provides wireless network protection. An application layer leverages the pay-peruse<br />
approach and elastic AWS services infrastructure in the S-VPC <strong>to</strong> deliver a scalable and<br />
highly available collaboration solution. Data is encrypted while at rest whether in RDS for<br />
Oracle or RDS for SQL Server. We recommend that each client manages the keys for data<br />
encryption within their own corporate data center with oversight provided by their system<br />
administra<strong>to</strong>rs. System administra<strong>to</strong>r access control is provided through the Xceedium Xsuite<br />
Cloud identity and access management solution. This suite supplements the AWS Management<br />
Console by vaulting administra<strong>to</strong>r credentials, enforcing separation of duties, and recording all