AVM-Cloud-LogoAVM-Cloud-LogoAVM-Cloud-LogoAVM-Cloud-Logo
  • SOLUTIONS
    • MegaMenu
      • Menu Desc
        Featured Solution Compute Compute for RDS Container Services Disk Connectivity Network & Security Co-Location Data Protection Analytics Managed Service License Subscription Marketplace Digital Workspace

        Virtual Private Cloud

        Multi-tenancy based cloud with logical separated network and compute resources that allows isolated and customizable virtual network environments; able to leverage AVM Cloud’s solutions.

        Dedicated Host

        A multi-tenancy based cloud with dedicated resources, able to enjoy the benefits of public cloud without noises from neighbours.

        AVM Cloud Fusion

        A hybrid cloud data protection solution which backs up and replicates your data and systems on-permises to AVM Cloud.

        Cloud-in-A-Box

        An on-premise OPEX model. Great for workloads that need to be in close proximity with users and other infrastructure.

        Sovereign Cloud

        Moving towards data sovereignty with AVM Cloud

        Zero Trust: The Modern Approach To Cybersecurity

        STD DR : vCPU/vRAM

        vCPU & vRAM resources can also be purchased for Disaster Recovery to protect against site failure.

        HI-MEMORY: vCPU/vRAM

        High memory ratio compute resources to cater for memory intensive workloads.

        STD : vCPU/vRAM

        Compute resources consists of CPU and RAM. These resources allows the execution of applications in a cloud environment.

        Database Licenses & Compute Resources

        Two distinct types of databases are offered: MS SQL and Postgre SQL, each providing a range of alternatives concerning the computational resources essential for the database.

        AVM Tanzu Containers (ATC)

        Mandatory Kubernetes Starter pack which consists of setup cost which includes a NSX edge, load balancer, a jump host and one public IP required to access the cluster.

        Storage Tier 0/1/2 Disk

        AVM Cloud offers 3 different tiers of storage.

        Object Storage (S3)

        Object Storage is a storage which manipulates and manages data storage as granular units known as objects.

        Storage Tier with L2 Link

        Layer 2 (L2) links are available for customers who subscribes for DR services. It is most often used to transfer data between the primary & secondary datacenter

        NFS Disk

        For applications which need to share the same data as different applications and have the shared storage de-coupled from the server, customers can subscribe to NFS services.

        Dedicated Port Gateway

        For co-location customers who want their devices in the datacentre to be connected to other devices or networks, customers need to subscribe to this service to enable the physical connectivity between devices.

        Cable Extension Services

        For co-location customers aiming to establish connections between their datacenter devices and external networks must opt for this service.

        DDOS Protection

        For customers who subscribed to a dedicated link from the telco and require clean pipe to the internet with DDOS protection, the service is available from the price list.

        Internet Bandwidth

        For customers whose applications operate within the AVM Cloud, and demand access to the public internet—whether to provide external services or retrieve data from external networks into the AVM Cloud environment.

        Public IP

        For customers whose applications necessitate access to the public internet and a public routable IPv4 address, they have the option to specify the quantity of IP addresses required.

        Kiwisyslog Server

        Customers who need to monitor their devices, such as servers, switches, firewalls, and routers, AVM Cloud’s Syslog Server offers a simple solution for collecting and viewing to ease syslog messages analysis.

        SSL VPN

        For administrators and users to connect to their VPC remotely and securely, each VPC will need to subscribe to SSL VPN services that provide a VPN gateway from anywhere in the world to connect to the resources within their VPC securely.

        NSX Load Balancing

        It is part of the services from the software defined network within the virtualization layer. This add-on service is for the edge gateway to provide additional services for local load balancing.

        AVM WAF Service

        Web application firewall service that filters, monitors, and block malicious HTTP traffic to and from a web service.

        AVM CA

        AVM Cloud acts as the private trusted entity that is used to distribute Certificates that can be used to authenticate servers during communication.

        Content Delivery Network

        AVM Cloud subscribes to a CDN (Content Delivery Network) services that spans its’ coverage around the world with the capabilities to provide content locally to its’ users.

        Fortigate Firewall (Virtual)

        Fortigate Firewall is a next-generation firewall to protect customer’s infrastructure within AVM Cloud. The virtual edition firewall is presented as a first line of defense from the outside world. For added protection, customers can opt to have multiple firewalls to create segments within their infrastructure to increase the protection.

        NSX Edge for VPC Gateway

        This gateway service provides NAT, routing and networking services that connect networks within the VPC to networks outside of their VPC.

        Global Load Balancing

        For customers that require load balancing of workload across multiple zones and even cloud service providers, customers can subscribe to this service.

        Deep Security & Agent-Based Anti-Malware

        AVM Cloud is an operator of PAAS which includes management of services up to the OS level, including managing the security of the OS from patching it to protect against vulnerability or malware.

        Full Rack or Partial Rack

        For customers who have their own physical equipment, for example Hardware Security Module, AVM Cloud provide co-location services.

        Smart Hand

        Tenants that have physical hardware in server co-location services who may need assistance in a break-fix scenario can subscribe to the Smart Hand service. Our data centre staff on-site can assist in receiving the RMA part, swap out the faulty part, and RMA the faulty part back to the vendor.

        L2 Link (Zone 1 and Zone 3)

        High bandwidth low latency network between Zone 1 and Zone 3 where customers that have workload on both zones can use this network for communication purposes.

        Snapshot Service

        Snapshot is a data protection feature that the external storage, at a point in time, will copy the data in the storage that can be recovered or restored in the event of any data corruption or deletion that affect the services.

        Replication Service

        For customers who wish to selectively nominate certain VMs to be replicated to the alternate data centre for data protection.

        Backup Capacity

        Customers can request for backup services for any VM that is provisioned in the cloud.

        AVM Insight Analytics

        For clients seeking a publicly accessible data collector, this service can be availed through the acquisition of the appropriate credentials.

        AVM Enforce Managed Firewall, WAF & LB

        Customers can subscribe to this service and offload their own IT personnel from the operation task of managing and monitoring firewall, load balancer and Web Application Firewall (WAF) in their AVM VPC subscription.

        AVM Enforce Technical Account Manager (TAM)

        This service encompasses direct engagement with AVM Cloud's TAM.

        AVM Enforce Data Transfer

        Efficient and reliable data transfer service to migrate a large amount of data through data transfer through a physical storage device. This eliminates the bottleneck caused by bandwidth availability.

        AVM Enforce Managed OS, Backup & DR

        With our Cloud Managed Backup Service, tenants in Malaysia can subscribe to it and offload their own IT personnel from the operation task of managing, monitoring OS, backup and DR of the VM in their AVM VPC subscription.

        AVM Enforce Managed Cyber Security

        Providing optimum cyber security service, customers also can request for Security Information and Event Management (SIEM) services for each of the security devices in their infrastructure.

        Server OS

        One of the benefits of moving workload into the cloud is to focus on your business and not on the complexity of IT.

        MS SQL Database

        Customers have the option of choosing enterprise edition, standard edition, web edition and express edition with different sizing in terms of the number of vCPU and vRAM available.

        2-Factor Authentication

        2-Factor Authentication (2FA) is for application developers to enhance authentication and authorization for their application.

        PAM & Session Monitoring

        The offered service incorporates a Session Monitoring feature, encompassing both Command Line Interface (CLI) and Graphic User Interface (GUI) modes.

        Remote Desktop

        AVM Cloud's Horizon DaaS RDSH (Remote Desktop Session Host) offers an entry-level solution enabling multiple users to simultaneously connect and utilize a single Windows Operating System, gaining access to applications in tandem.

        Virtual Desktop

        The AVM Virtual Desktop Services offers a solution that empowers organizations to adopt flexible work arrangements without relinquishing control over desktop management.

  • SECTORS
    • MegaMenu
      • Menu Desc
        Conglomerate Fast Food Chain Finance Services

        Conglomerate

        Into the world of diversification

        Fast Food Chain

        Bringing technology and the fast-food chain industry together

        Finance Services

        The future of financial services is now

  • RESOURCES
    • MegaMenu
      • Menu Desc
        Blog & News E-Books Videos
        20/06/2023
        20/06/2023
        Blog
        Categories
        • Blog

        Is Disaster Recovery the same as Business Continuity Planning?

        15/10/2022
        15/10/2022
        Blog
        Categories
        • Blog

        Can failing to protect customer data cause your business to fail?

        MORE LIKE THIS

        E-Books

        Browse through individual pages and catch a glimpse of the captivating content that awaits you

        Videos

        Explore AVM Cloud’s collection of engaging and informative videos

  • ABOUT
  • GET IN TOUCH
  • SOLUTIONS
  • SECTORS
    • CONGLOMERATE
    • FAST FOOD CHAIN
    • FINANCE SERVICES
  • RESOURCES
    • BLOG & NEWS
    • E-BOOKS
    • VIDEOS
  • ABOUT US
  • GET IN TOUCH
All Systems OperationalLogin
✕
Why Cyber Security Is Important For Your Business?
13/06/2019
Executives now recognize cybersecurity as a key business driver
21/06/2019

Zero Trust: The Modern Approach To Cybersecurity

17/06/2019
Categories
  • Blog
Tags
  • 2019

Security strategy begins with an attitude: Never trust, always verify. The conventional notion of the enterprise perimeter—imagining it as one big bubble to be protected—is now thoroughly outdated in a world where infiltration can be accomplished via a staggering number of devices and applications, either already in the network or soon to join it.

In a modern security environment, where devices and external data sources from the internet of things and the edge are all factors, security strategies must be built around a zero trust approach—in other words, one that trusts nothing outside or inside an organization. With this model, the network and the threats that will inevitably come are viewed as constantly in motion, amorphous and invisible. Today’s perimeter should not be seen as one big protective cover over the entire enterprise.

Zero trust architecture ensures that data and access across the network are secure and based on parameters like user identity and location. It inspects and logs all traffic, learns and monitors network patterns, and adds authentication methods into the security mix, all with the goal of seeing every user and device connected to the network at any moment.

Most organizations understand that zero trust is the best way to approach security in a perimeter-free business environment. In a recent Forbes Insights survey of more than 1,000 security practitioners and security executives (such as chief information security officers), 66% of respondents say they have zero trust policies for application behavior, devices and access. And 9 in 10 organizations identified by the survey as “cybersecurity trailblazers”—those with security highly integrated into decision-making across their IT security stacks have zero trust policies in place. In fact, it’s a distinguishing feature of their leadership.

Insider Security: Protecting The Inside Of The Perimeter

Insider threats are a major source of breaches and a concern among security teams, in large part because they originate internally in a dizzying number of ways—from devices and applications that are anywhere—and are hard to detect quickly.

Gaining the upper hand is about governing the identity and access of a big cast of players. Many breaches originate from employees and, according to Accenture’s 2018 State of Cyber Resilience, the accidental publication of confidential information and insider attacks have the greatest impact, above attacks by hackers. Ultimately, this is due to a failure to manage the digital identities and behavior of individuals like employees, contractors, partners and nonhuman actors like bots or applications. And they’re not necessarily malicious in intent; they can result from careless or poorly trained personnel or a bot that acquires new privileges.

The challenge comes down to this: making data and applications accessible to the right users in a way that is fast and efficient—and secure. It’s a tug-of-war over access and control. Simply trusting vast swaths of the enterprise’s internal landscape won’t work because the ground is constantly shifting as employees move to new roles and require different access privileges. New platforms and applications appear as well. The network keeps getting bigger—and so does the attack surface.

What organizations need is the ability to authenticate and authorize users, monitor policies and privileges in place, and detect any anomalous insider activity. Visibility and validation are mission-critical capabilities that are a particular focus for security executives. So is training to make stakeholders aware of best security practices. The idea isn’t to distrust your people but to assume they are a potential source of infiltration.

Zero Trust: Enabling Business

Successful cybersecurity strategies reduce the complexity of the IT environment to something simple—or far simpler than it would be to the unaided naked eye trying to scan the network for anomalies.

The technologies and approaches that enable zero trust accomplish four core tasks:

  1. Micro-segmentation.
  2. This is the process of placing security perimeters into small, isolated areas (or zones) to maintain separate access for different parts of the network. With micro-segmentation, files in a network can be placed in separate, secure zones. A user or program with access to one of those zones won’t be able to access any of the other zones without separate authorization. This ties security to individual workloads.

  3. Application behavior and visibility.
  4. One of the benefits of micro-segmentation is the enablement of application security that includes built-in policies that define allowed behavior and protection for each individual build. For example, ideation through development occurs in an environment isolated from the rest of the network so that any breach of an application will be contained and prevent spreading into the rest of the network. Visibility into application behavior on devices that access applications also needs to be taken into account so that anomalous activity can be detected and action can be taken more quickly.

  5. Multi-factor authentication (MFA).
  6. MFA adds more pieces to the authentication puzzle that malicious actors must solve. The age of the password, like the conventional view of the perimeter, is a thing of the past. The use of two-factor authorization—the addition of a code sent to another device—is now widely used and accepted by consumers and stakeholders. Other forms of authentication—biometrics, for example—are emerging to bolster identity verification.

  7. Least privilege.
  8. This is a principle of information security that grants only as much access as an end user—a device, a worker, a bot—needs for a particular purpose or role. It’s a key part of zero trust identity and access management, and a way to unify end user and data center security. It reduces risk to a segmented level—to applications and data—and is a way of containing or shrinking the perimeter of each individual device: A smartphone or a workstation, or any other device, gets access only to what that user needs.

    Security executives are being asked to be more strategic and drive revenue through technologies and integration as their businesses expand. At the same time, cybersecurity is an incredibly complex problem to solve from both the end user side and in the data center because the attack surface is so broad. It’s no longer a question of “if” a breach will happen but “when.”

    The key to enabling growth and transformation means securing digital identities to enable fluid and secure work from anywhere. A zero trust approach reduces time spent pursuing false positives and increases productivity, both among security teams and the legions of workers accessing the network from anywhere through any device.

Share

Related Posts

20/06/2023
20/06/2023
Blog
Categories
  • Blog

Is Disaster Recovery the same as Business Continuity Planning?

Do you like it?
Read more
15/10/2022
15/10/2022
Blog
Categories
  • Blog

Can failing to protect customer data cause your business to fail?

Do you like it?
Read more
09/11/2021
09/11/2021
Blog
Categories
  • Blog

Immutable Backup Storage

Do you like it?
Read more
Share

More news

20/06/2023

Is Disaster Recovery the same as Business Continuity Planning?


Read more
15/10/2022

Can failing to protect customer data cause your business to fail?


Read more
09/11/2021

Immutable Backup Storage


Read more

The leading cloud computing services provider in Malaysia

Step into an intelligent future. Get started today.

enquiry@avmcloud.net

©2023 AVM Cloud. All rights reserved.

  • Privacy Policy
SOLUTIONS
  • Compute
  • Compute for RDS
  • AVM Tanzu Kubernetes (ATC)
  • Disk
  • Connectivity
  • Network & Security
  • Co-Location
  • Data Protection
  • AVM Insight Analytics
  • AVM Enforce Managed Service
  • License Subscription
  • Marketplace
  • Digital Workspace
FEATURED SOLUTIONS
  • Virtual Private Cloud
  • Dedicated Host
  • AVM Cloud Fusion
  • Cloud-in-a-Box
  • Sovereign Cloud
SECTORS
  • Conglomerate
  • Fast Food Chain
  • Finance Services

RESOURCES
  • Blog & News
  • E-Books
  • Videos
COMPANY
  • About
  • Get In Touch
  • Login
AVM Cloud. All rights reserved. Terms of use Privacy Policy