Laserfiche WebLink
SOLICITATION # CH16012 <br />Computing power and resources are load -balanced across infrastructure and replicated to <br />redundant datacenters in the event of a disaster. Client -specific data stored in databases are <br />logically separated from other clients' data providing segmentation and isolation. <br />VirtueStream <br />Key to Virtustream solution is its proprietary and patented solution of uVM technology, which is <br />effectively a granular solution for resource pooling, providing application performance, pay for <br />consumption only and segregate resources for security and compliance, but aggregate for cost <br />efficiency. In addition, Virtustream is currently one of very few Cloud Service Provider with <br />capabilities for Geo-Fencing and Geo-Tagging of the virtual machines to a specific data center, <br />and getting down to cluster and host machine level. The resources are pooled based on two <br />specific criteria: <br />-ONLY Accessible Using Private Network — We call this pool "Enterprise" which most of <br />Virtustream's IaaS workload is residing. There is no direct access from Internet into this pool. This <br />is protected via a pair of routing and firewall from any other zones. <br />8.1.2.4 NIST Characteristic - Rapid Elasticity: Provide a brief written description of how the cloud solutions <br />proposed satisfies this NIST Characteristic. Attest capability and briefly describe how rapid elasticity <br />technical capability is met. <br />CA <br />APM <br />CA API Management SaaS (SaaS APIM) has been built from the ground up to be a <br />multi -tenanted, SaaS-based offering that leverages Amazon's infrastructure to scale <br />appropriately; utilize a continuous integration model to provide for frequent updates; <br />and fail over across multiple availability zones. <br />MAA <br />The pool of web and application servers can be grown or shrunk when necessary. <br />Any changes to the size of the pool remains transparent to end -users and customers, <br />and would only be done by CA MAA systems administrators. <br />CA Agile <br />This is a SaaS service, therefore, CA monitors all system resources and have alerting <br />mechanisms when resource constraints have reached a defined threshold. Data <br />storage and network capacity are monitored and scaled to meet current client <br />demands. Compute resources are scaled to meet client processing requirements <br />ASM <br />All ASM core servers are dedicated physical servers; there is no elasticity. The ASM <br />Public Status Pages are served from web servers in the Amazon Cloud, and the pool <br />of web servers can be grown or shrunk if necessary. Any changes to the size of the <br />pool would be transparent to end -users and customers, and would only be done by <br />CA ASM systems administrators. Since this is a SaaS environment the CA SaaS <br />Operations and delivery along with RackSpace are responsible for management of the <br />capacity and monitoring. <br />Google <br />Saas, Google Apps can scale from 1 user to tens of thousand users. The usage of the services <br />included are designed to horizontal scale within the confines of the per user storage allocation. <br />Google Apps can be purchased with a 30gb per user allocation or with unlimited storage. <br />Paas/laaS, Google Cloud Platform was designed to scale on demand both in terms of available <br />resources for applications designed and running on Google App Engine but also Compute Engine <br />resources and more. <br />AODocs <br />AODocs can scale from one user to tens of thousand users. The storage is based on the Google <br />Apps storage which could be from 30Gb to unlimited storage depending on the Google Apps <br />subscription. <br />Virtru <br />Presently we over -provision services by 2.5x peak traffic in order to handle spikes. We are in the <br />process of implementing horizontal scaling of all services and expect to have that work completed <br />in the second half of 2016. <br />Salesforce <br />User Authentication Logon is form -based. When users log into the Salesforce application, they <br />submit a username and password, which are sent to Salesforce via an TLS-encrypted session. <br />carahsoft 33 carahsoft <br />