Enterprise Data Sheet
CloudSwitch enables enterprises to run applications in the cloud simply and securely, without re-architecting the application or changing management tools and policies.
For the first time, enterprises can run multi-tiered applications in the right cloud computing environment with point-and-click simplicity and no modifications. CloudSwitch’s innovative software bridges the enterprise data center with cloud computing services, extending enterprise security and control into the cloud. With CloudSwitch, applications remain tightly integrated with enterprise data center tools and policies, and are managed as if they were running locally.
Built on patent-pending Cloud Isolation Technology™, CloudSwitch puts control over cloud-based applications and data where it belongs — safely in the hands of the enterprise. Applications can be moved easily between cloud environments and back to the data center based on the requirements of the business. CloudSwitch protects enterprises from the complexity, risks and potential lock-in of cloud computing, freeing them to leverage the cloud’s advantages in cost and business agility.
Enterprise Management Console (Enlarge Image)
CloudSwitch is delivered as a software appliance which is easily downloaded and deployed into the data center. This appliance contains the management components for discovering applications, orchestrating cloud deployments, and managing cloud utilization. It also creates a secure data path to bridge network connectivity between the data center and the chosen cloud provider. Multiple appliances can be used for availability and scaling purposes. The industry-first CloudFit™ function ensures that cloud deployments operate with sufficient performance and reliability by automatically selecting the appropriate combination of processor, memory, and storage.
CloudSwitch delivers secure communication and storage services by automatically provisioning a local control point within each cloud deployment. These are virtual instances that run on behalf of the enterprise user and manage the cloud infrastructure, including data management, synchronization, and long-duration data transfers. They also provide encryption services covering network and storage utilization. This configuration ensures that cloud providers have no access to internal network or storage communication at any point—online, offline, or in transition.
Components Work Cooperatively to Simplify, Secure, and Manage Operating Environments in the Cloud