Changes

no edit summary
Line 20: Line 20:     
In order to connect remote enterprise customers to their applications and data, hosted MSPs must lease bandwidth from 3rd party connectivity service providers. The hosted MSP data center will also include secure co-location areas where multiple service providers will deploy their equipment, which is to be used to backhaul traffic from enterprise customer locations.  
 
In order to connect remote enterprise customers to their applications and data, hosted MSPs must lease bandwidth from 3rd party connectivity service providers. The hosted MSP data center will also include secure co-location areas where multiple service providers will deploy their equipment, which is to be used to backhaul traffic from enterprise customer locations.  
 +
 +
[[File:MSP.PNG|center|800×468 pixels|frame|The Key Elements of a Hosted MSP Netowrk]]
    
Hosted applications require high bandwidth, availability, and security. MSPs that ensure end-to-end security of their offering will take a larger market share of enterprise customers looking to outsource applications. Offering an encrypted on ramp to hosted services will differentiate the service in the market.  
 
Hosted applications require high bandwidth, availability, and security. MSPs that ensure end-to-end security of their offering will take a larger market share of enterprise customers looking to outsource applications. Offering an encrypted on ramp to hosted services will differentiate the service in the market.  
Line 35: Line 37:  
* network-wide view of all devices performing encryption
 
* network-wide view of all devices performing encryption
 
* ability to integrate with 3rd party key management platforms  
 
* ability to integrate with 3rd party key management platforms  
 +
 +
[[File:NSP.PNG|frame|center|Network Security Portal]]
    
NSP reduces the barriers to outsourcing expensive encryption devices for service providers. It allows service providers to acquire encryption as an Operational Expense as opposed to a Capital Expenditure, while still retaining control of information security.  
 
NSP reduces the barriers to outsourcing expensive encryption devices for service providers. It allows service providers to acquire encryption as an Operational Expense as opposed to a Capital Expenditure, while still retaining control of information security.  
Line 42: Line 46:  
==External Links==
 
==External Links==
 
* [http://superna.net/library/whitepapers/Superna%20White%20Paper%20Securing%20the%20Cloud%20-%20A%20Perspective.pdf White Paper: Securing the Cloud, A Perspective]
 
* [http://superna.net/library/whitepapers/Superna%20White%20Paper%20Securing%20the%20Cloud%20-%20A%20Perspective.pdf White Paper: Securing the Cloud, A Perspective]
 +
 +
<br>
 +
<div style="overflow:auto;height:1px;">
 +
[[Keyword:=Superna]]
 +
[[Keyword:=encryption]]
 +
[[Keyword:=key management]]
 +
[[Keyword:=encryption key management]]
 +
[[Keyword:=network key management]]
 +
[[Keyword:=white paper]]
 +
[[Keyword:=encryption key management white paper]]
 +
 +
</div>
 +
<br>
52

edits