AVM-Cloud-LogoAVM-Cloud-LogoAVM-Cloud-LogoAVM-Cloud-Logo
  • SOLUTIONS
    • MegaMenu
      • Menu Desc
        Featured Solution Compute Compute for RDS Container Services Disk Connectivity Network & Security Co-Location Data Protection Analytics Managed Service License Subscription Marketplace Digital Workspace

        Virtual Private Cloud

        Multi-tenancy based cloud with logical separated network and compute resources that allows isolated and customizable virtual network environments; able to leverage AVM Cloud’s solutions.

        Dedicated Host

        A multi-tenancy based cloud with dedicated resources, able to enjoy the benefits of public cloud without noises from neighbours.

        AVM Cloud Fusion

        A hybrid cloud data protection solution which backs up and replicates your data and systems on-permises to AVM Cloud.

        Cloud-in-A-Box

        An on-premise OPEX model. Great for workloads that need to be in close proximity with users and other infrastructure.

        Sovereign Cloud

        Moving towards data sovereignty with AVM Cloud

        Ransomware Attack – How will it impact a business?

        STD DR : vCPU/vRAM

        vCPU & vRAM resources can also be purchased for Disaster Recovery to protect against site failure.

        HI-MEMORY: vCPU/vRAM

        High memory ratio compute resources to cater for memory intensive workloads.

        STD : vCPU/vRAM

        Compute resources consists of CPU and RAM. These resources allows the execution of applications in a cloud environment.

        Database Licenses & Compute Resources

        Two distinct types of databases are offered: MS SQL and Postgre SQL, each providing a range of alternatives concerning the computational resources essential for the database.

        AVM Tanzu Containers (ATC)

        Mandatory Kubernetes Starter pack which consists of setup cost which includes a NSX edge, load balancer, a jump host and one public IP required to access the cluster.

        Storage Tier 0/1/2 Disk

        AVM Cloud offers 3 different tiers of storage.

        Object Storage (S3)

        Object Storage is a storage which manipulates and manages data storage as granular units known as objects.

        Storage Tier with L2 Link

        Layer 2 (L2) links are available for customers who subscribes for DR services. It is most often used to transfer data between the primary & secondary datacenter

        NFS Disk

        For applications which need to share the same data as different applications and have the shared storage de-coupled from the server, customers can subscribe to NFS services.

        Dedicated Port Gateway

        For co-location customers who want their devices in the datacentre to be connected to other devices or networks, customers need to subscribe to this service to enable the physical connectivity between devices.

        Cable Extension Services

        For co-location customers aiming to establish connections between their datacenter devices and external networks must opt for this service.

        DDOS Protection

        For customers who subscribed to a dedicated link from the telco and require clean pipe to the internet with DDOS protection, the service is available from the price list.

        Internet Bandwidth

        For customers whose applications operate within the AVM Cloud, and demand access to the public internet—whether to provide external services or retrieve data from external networks into the AVM Cloud environment.

        Public IP

        For customers whose applications necessitate access to the public internet and a public routable IPv4 address, they have the option to specify the quantity of IP addresses required.

        Kiwisyslog Server

        Customers who need to monitor their devices, such as servers, switches, firewalls, and routers, AVM Cloud’s Syslog Server offers a simple solution for collecting and viewing to ease syslog messages analysis.

        SSL VPN

        For administrators and users to connect to their VPC remotely and securely, each VPC will need to subscribe to SSL VPN services that provide a VPN gateway from anywhere in the world to connect to the resources within their VPC securely.

        NSX Load Balancing

        It is part of the services from the software defined network within the virtualization layer. This add-on service is for the edge gateway to provide additional services for local load balancing.

        AVM WAF Service

        Web application firewall service that filters, monitors, and block malicious HTTP traffic to and from a web service.

        AVM CA

        AVM Cloud acts as the private trusted entity that is used to distribute Certificates that can be used to authenticate servers during communication.

        Content Delivery Network

        AVM Cloud subscribes to a CDN (Content Delivery Network) services that spans its’ coverage around the world with the capabilities to provide content locally to its’ users.

        Fortigate Firewall (Virtual)

        Fortigate Firewall is a next-generation firewall to protect customer’s infrastructure within AVM Cloud. The virtual edition firewall is presented as a first line of defense from the outside world. For added protection, customers can opt to have multiple firewalls to create segments within their infrastructure to increase the protection.

        NSX Edge for VPC Gateway

        This gateway service provides NAT, routing and networking services that connect networks within the VPC to networks outside of their VPC.

        Global Load Balancing

        For customers that require load balancing of workload across multiple zones and even cloud service providers, customers can subscribe to this service.

        Deep Security & Agent-Based Anti-Malware

        AVM Cloud is an operator of PAAS which includes management of services up to the OS level, including managing the security of the OS from patching it to protect against vulnerability or malware.

        Full Rack or Partial Rack

        For customers who have their own physical equipment, for example Hardware Security Module, AVM Cloud provide co-location services.

        Smart Hand

        Tenants that have physical hardware in server co-location services who may need assistance in a break-fix scenario can subscribe to the Smart Hand service. Our data centre staff on-site can assist in receiving the RMA part, swap out the faulty part, and RMA the faulty part back to the vendor.

        L2 Link (Zone 1 and Zone 3)

        High bandwidth low latency network between Zone 1 and Zone 3 where customers that have workload on both zones can use this network for communication purposes.

        Snapshot Service

        Snapshot is a data protection feature that the external storage, at a point in time, will copy the data in the storage that can be recovered or restored in the event of any data corruption or deletion that affect the services.

        Replication Service

        For customers who wish to selectively nominate certain VMs to be replicated to the alternate data centre for data protection.

        Backup Capacity

        Customers can request for backup services for any VM that is provisioned in the cloud.

        AVM Insight Analytics

        For clients seeking a publicly accessible data collector, this service can be availed through the acquisition of the appropriate credentials.

        AVM Enforce Managed Firewall, WAF & LB

        Customers can subscribe to this service and offload their own IT personnel from the operation task of managing and monitoring firewall, load balancer and Web Application Firewall (WAF) in their AVM VPC subscription.

        AVM Enforce Technical Account Manager (TAM)

        This service encompasses direct engagement with AVM Cloud's TAM.

        AVM Enforce Data Transfer

        Efficient and reliable data transfer service to migrate a large amount of data through data transfer through a physical storage device. This eliminates the bottleneck caused by bandwidth availability.

        AVM Enforce Managed OS, Backup & DR

        With our Cloud Managed Backup Service, tenants in Malaysia can subscribe to it and offload their own IT personnel from the operation task of managing, monitoring OS, backup and DR of the VM in their AVM VPC subscription.

        AVM Enforce Managed Cyber Security

        Providing optimum cyber security service, customers also can request for Security Information and Event Management (SIEM) services for each of the security devices in their infrastructure.

        Server OS

        One of the benefits of moving workload into the cloud is to focus on your business and not on the complexity of IT.

        MS SQL Database

        Customers have the option of choosing enterprise edition, standard edition, web edition and express edition with different sizing in terms of the number of vCPU and vRAM available.

        2-Factor Authentication

        2-Factor Authentication (2FA) is for application developers to enhance authentication and authorization for their application.

        PAM & Session Monitoring

        The offered service incorporates a Session Monitoring feature, encompassing both Command Line Interface (CLI) and Graphic User Interface (GUI) modes.

        Remote Desktop

        AVM Cloud's Horizon DaaS RDSH (Remote Desktop Session Host) offers an entry-level solution enabling multiple users to simultaneously connect and utilize a single Windows Operating System, gaining access to applications in tandem.

        Virtual Desktop

        The AVM Virtual Desktop Services offers a solution that empowers organizations to adopt flexible work arrangements without relinquishing control over desktop management.

  • SECTORS
    • MegaMenu
      • Menu Desc
        Conglomerate Fast Food Chain Finance Services

        Conglomerate

        Into the world of diversification

        Fast Food Chain

        Bringing technology and the fast-food chain industry together

        Finance Services

        The future of financial services is now

  • RESOURCES
    • MegaMenu
      • Menu Desc
        Blog & News E-Books Videos
        20/06/2023
        20/06/2023
        Blog
        Categories
        • Blog

        Is Disaster Recovery the same as Business Continuity Planning?

        15/10/2022
        15/10/2022
        Blog
        Categories
        • Blog

        Can failing to protect customer data cause your business to fail?

        MORE LIKE THIS

        E-Books

        Browse through individual pages and catch a glimpse of the captivating content that awaits you

        Videos

        Explore AVM Cloud’s collection of engaging and informative videos

  • ABOUT
  • GET IN TOUCH
  • SOLUTIONS
  • SECTORS
    • CONGLOMERATE
    • FAST FOOD CHAIN
    • FINANCE SERVICES
  • RESOURCES
    • BLOG & NEWS
    • E-BOOKS
    • VIDEOS
  • ABOUT US
  • GET IN TOUCH
All Systems OperationalLogin
✕
How did GPU revolutionize Machine Learning?
08/10/2019
AVM Cloud Advances With Kubernetes as a Service
27/02/2020

Ransomware Attack – How will it impact a business?

14/02/2020
Categories
  • Blog
Tags
  • 2020
Image by Darwin Laganzon from Pixabay

The horror of a ransomware attack

“We are being compromised by a ransomware attack” – The dreaded message that all executives fear receiving. Executives are losing sleep and they are at constant distraught over such incidents. Regardless of organization’s size; the availability of data, security of information, and privacy of intellectual properties are critical assets that are vulnerable to risk.

It’s no longer a question if an organization will fall victim to a ransomware attack, it’s just a matter of time before it happens. Business operations and customer services these day are gradually more IT reliant. Therefore, organizations should prioritize prevention & recovery measures for their IT infrastructure to ensure business continuity.

What are the risks?

What are the impacts for the organization when they became the latest victim of the flavour-of-the-week ransomware? The impacts can be measured by productivity, increasing cost, paying for ransom, and most importantly, reputation. All these impacts may directly or indirectly affect your revenue.

  1. Productivity – When your organization has been compromised, assets has to be confiscated for forensic purposes. This in turn will impede your productivity. The new product that you want to launch this year? That will have to wait.
  2. Remediation cost – Very often when an organisation has been hit by a ransomware attack, the remediation comes with a costly price.
    • Cost of data recovery from backup tapes
    • Cost of IT Security forensic
    • Cost of additional training for employee to prevention measures
  3. Paying for ransom – Paying ransom will damage your business. James Trainor, former lead of Cyber Division at FBI Headquarters said “The principle reason why people pay the ransom is that they do not have a safe and secure separate backup, meaning that they have no alternatives. I think one of the bigger problems that companies have is that they haven’t really tested this type of scenario.”
  4. Reputation – Trust has always been the crucial to a business. It will be devastating to the company bottom line if they are the victim, since it will also signify that there is a gap in their security process and gave the impression that the public cannot trust this company to protect their confidential information and their money.
Image by Darwin Laganzon

NAS is not a luxury but a necessity

Shared file system is not something new, since the creation of NFS few decades ago, it has become an important IT tool that organization depend on for their business and operation. In my first job out of college many years ago, there was a large NFS farm that served as a centralized storage for dozens of equipment in the factory floor to keep detail data of each component made at every stage of the manufacturing process. The data were collected to be analysed for quality control, process improvement and for identifying problem in the material. I couldn’t imagine an environment without the NFS to provide the service, maybe that’s why Sun Microsystems was selling like hot cakes at that time.

Maturity of Enterprise NAS

It is unavoidable to have an enterprise NAS, and at the same time, to be aware of the risks and impact it can have to the business. The good news is that there are solutions that can address the risk.

NAS has been in the market for decades and the technology is mature, secured and widely available. With NAS, it can deliver high performance storage services to the most demanding customer, enabling the user to focus on their tasks at hand. At the same time, the storage is able to provide advanced data protection, from the local snapshot, tiering of snapshot to another media and location, and replicating the data to a DR site, synchronously if the requirement demands it.

Image by Darwin Laganzon from Pixabay

Antimalware Security from end-point to storage

In order to help addressing the malware and ransomware threats, the storage will comes with storage level anti-virus software to scan every piece of files that got save into the storage, only file that pass the virus scanning will be visible to the creator and other users. This will immediately prevent the storage becoming the distributor of malware and cease the spreading of viruses within the organization. But bear in mind, this solution should work together with the end point security software that the organization chose, storage anti-virus should not be the only solution.

In the event that one of the user’s computers was affected with malware and got triggered to start wiping the data in the computer as well as any connected share drives, the ransomware detection and recovery solution that bundled with the storage can detect the behaviour and use the black list of file name and type to quickly take action to revoke the access right of the user to prevent further damage. The user will only have read only access right and need to get the IT team to enable the write access after taking action to remove the malware in the computer.

One of the great features of the ransomware recovery solution is the capability to know what are the files and folders that got modified during the attack and able to recovery only those files from backup. In other less advance recovery approach solutions in the market, the recovery is from a point in time copy of backup, which effectively restore every files and folders from backup, regardless of whether it was affected by the ransomware. The modern ransomware is smart enough to maintain the attribute of the file, for example, owner, file size, timestamp of last access, this make it almost impossible to identify which file and folder were affected. If the backup is from 3 days ago, all work done within the last 3 days will be gone, and if the folder hold data for 500 users, that is a big productivity lost for the organization.

With the NAS bundle that includes comprehensive data protection, anti-virus and ransomware detection/recovery solution, CIO can rest assure that his data is secured, protected, and able to recover within a very short time if they were attacked.

There are other additional features in the solution that can also help IT organization in reducing the cost of storage by utilizing the efficiency of the storage as well as the innovative private or public cloud storage tiering solution.

Contact us with the link below for more details on our NAS bundling available.

Share

Related Posts

20/06/2023
20/06/2023
Blog
Categories
  • Blog

Is Disaster Recovery the same as Business Continuity Planning?

Do you like it?
Read more
15/10/2022
15/10/2022
Blog
Categories
  • Blog

Can failing to protect customer data cause your business to fail?

Do you like it?
Read more
09/11/2021
09/11/2021
Blog
Categories
  • Blog

Immutable Backup Storage

Do you like it?
Read more
Share

More news

20/06/2023

Is Disaster Recovery the same as Business Continuity Planning?


Read more
15/10/2022

Can failing to protect customer data cause your business to fail?


Read more
09/11/2021

Immutable Backup Storage


Read more

The leading cloud computing services provider in Malaysia

Step into an intelligent future. Get started today.

enquiry@avmcloud.net

©2023 AVM Cloud. All rights reserved.

  • Privacy Policy
SOLUTIONS
  • Compute
  • Compute for RDS
  • AVM Tanzu Kubernetes (ATC)
  • Disk
  • Connectivity
  • Network & Security
  • Co-Location
  • Data Protection
  • AVM Insight Analytics
  • AVM Enforce Managed Service
  • License Subscription
  • Marketplace
  • Digital Workspace
FEATURED SOLUTIONS
  • Virtual Private Cloud
  • Dedicated Host
  • AVM Cloud Fusion
  • Cloud-in-a-Box
  • Sovereign Cloud
SECTORS
  • Conglomerate
  • Fast Food Chain
  • Finance Services

RESOURCES
  • Blog & News
  • E-Books
  • Videos
COMPANY
  • About
  • Get In Touch
  • Login
AVM Cloud. All rights reserved. Terms of use Privacy Policy