Infrastructure as a Service

Quality IT infrastructure as a service

Penta specializes in IT infrastructure as a service (IaaS) and boasts 20 years experience in IT hosting. From cost effective shared resources to highly customized advanced infrastructure setups.

Built to latest best practices by specialist engineers your cloud IaaS will feature sophisticated redundancy and disaster recovery and independantly audited for regulatory compliance and peace of mind.

Available either as fully managed by Penta or as a self-service platform.

GET STARTED

Multi-layered Security

Security at the heart of everything
Whatever the service, data security is the priority. Penta deployes the latest best practices, monitored and maintened by industry-leading experts.

Hover over the diagram to read more.

Remote user

Users from your organization whatever the location connect to Penta's infrastructure using secure Virtual Private Network technology and bank-level multi-factor authentication.

Internet Service Providers (ISPs)

Connections to Penta's data centers is made through either dedicated connections leased from specialist network providers or through commercially available Internet Service Providers (ISPs).

Network control

Every aspest of Penta's infrastructure is built in a High Availability configuration. This means that all hardware and software components are duplicated so that there is no single point of failure.

  • Continuous monitoring by Intrustion Prevention and Detection Systems (IPS/IDS) with engineers on standby to react to any suspicious activity
  • External and internal load balancers (Ext/Int LBs) to ensure traffic is routed efficiently and ensuring seamless uptime in case of failures
  • External and internal firewalls (Ext/Int FWs) for optimum traffic control and hacking defenses

Local Area Networks

Network traffic is routed to either the user facing front end Local Area Network (LAN) or the seperate back end LAN where the data resides.

Storage Area Networks (SANs)

Redundant Storage Area Networks (SANs) are safely isolated behind multiple security layers and only accessible through specific routes defined and controlled by Penta's team of network security engineers.

The SANs are continually backed up and replicated across at least geographically separated sites to ensure your data is always safe and accessible.

Office connectivity

Your company connects into the secure Penta network through a dedicated fiber optic connection or through an IPSec site-to-site Virtual Private Network (VPN) as a backup connection.

The network configuration means that intruders have to work their way through Penta's external and internal security measures if accessing from the outside the company.

And if accessing from within the company, intruders would still have to make their way through Penta's tough internal security protocols.