What Does This Mean For You

Create your Own CDE For the first time in Pakistan
You now have the ability to create your own cardholder data environment (CED) that can store, transmit or process cardholder data on the cloud. hosting this critical data on the RapidCompute cloud can actually help meet the demand for a higher level of security.

Get Control Of Your Data Centers Great amount of visibility and transparency
A major benefit of moving to the cloud is that you have greater control over in which of our 3 multi regional data centers your data resides. You also have a great amount of visibility and transparency into which controls are applied to which resources, and how those controls are operating.

Centralized Log Collection Challenge to keep up with high volume log data
Another advantage is the requirement for centralized log collection and monitoring which ensures that as your company grows and expands, there is little challenge to keep up with high volume log data.
What It Involves

Maintenance
Maintenance of a secure network by using robust firewalls

Protection
Protection of vital data while it is transmitted via effective digital encryption

Updates
Regular and frequent updates for anti-virus software, anti-spyware programs, and other anti-malware solutions.

Security Policy
Formal information security policy defined, maintained, and followed at all times and by all participating entities.

Controlled Access
Controlled access to system information and operations. Unique and confidential identification name or number assigned to all users.

Constant Monitoring
Constant monitoring of networks to ensure all security measures and processes are in place.
Major Benefits
- Our 100% Compliance Guarantee reduces your regulatory risk.
- Multiple layers of security reduce your risk of non-compliance.
- High availability and scalability helps you maximize your IT budget particularly during peak seasons.
- Transparent pricing Reduce the associated effort and costs of getting your own PCI DSS certification.
- Expedite the time to deploy on your solutions.

Data Access Security
RapidCompute provides each customer with a unique VLAN, which makes it virtually impossible for potential attackers to snoop on our customers’ data. Important account information is stored externally in a secure billing platform. RapidCompute does not store any customer credit card or bank account information anywhere on its system.
RapidCompute provides network management tools through its customer portal to help customers configure remote access to their RapidMachines. Internet access to RapidCompute may be obtained through any ISP (and internet connection through Cybernet is not necessary). However, the security controls related to internet traffic in such a case are covered under the contracted ISP’s own domain.
The hypervisor used by RapidCompute is a secure, trusted and highly supported commercial platform. Furthermore, RapidCompute administrators, with decades of experience managing and securing data of Cybernet customers, follow best practices to protect customer access information such as user accounts, passwords and admin user IDs.
The RapidCompute network is also protected by a state-of-the-art Unified Threat Management (UTM) firewall cluster that provides effective protection from a multitude of threats emanating from the internet.
- Although customer stored data cannot be accessed either by RapidCompute administrator or by other customers, customers are recommended to employ data encryption features of their cloud OS.
- Create frequent snapshots of RapidMachines and store them locally, separate from the RapidMachines to ensure quick rebuild in the case of failures.
- Manage and protect access to RapidMachines by frequently reviewing authorization rights (including regularly changing passwords) of organizational users and tracking access records.
- Authorize only specific (and necessary) users to perform financial transactions through the RapidCompute customer portal.
- Implement additional security controls on your RapidMachines such as protection against viruses, Trojans, worms and root kits at the OS level. Manage secure log-ins through Remote Desktop or VNC.
- Since all traffic is blocked by default, customers must configure OS level firewall policies according to their security needs.
Physical Security
RapidCompute infrastructure is housed in Cybernet’s state-of-the-art data center.
This data center has the following features:
- Two layer physical security comprising armed guards on each floor and the entrance to the building available around the clock to restrict access to authorized users only.
- Three layer Digital Identity check mechanism in place before reaching the actual facility to ensure restricted and authorized access.
- 24/7 monitoring through CCTV cameras monitored locally and remotely. Each aisle and corner of the inside facility is monitored whereas all entry and exit points outside are also observed.
- World’s leading fire suppression system Inergen in N+1 configuration and intelligent smoke detectors

Self Service Portal
With our intuitive self-service cloud portal, users have immediate access to information like logs, usage or monitoring files; without having to wait for an email response or a returned telephone call. The portal also allows customers to provision IT services on their own. It offers 24 hour-a-day support and service where the customers have the freedom to reserve, provision, recycle, and modify virtual servers and storage and launch applications as and when they require, without going through a lengthy process.

- Optimize allocation of virtualized resources so that organizations can rapidly scale up and scale down to satisfy their requirements.
- Autoscaling feature to help applications gracefully handle increase in traffic, allowing for greater uptime and more availability
- Reduce or limit the amount of time it takes to deploy new virtual machines.
- More efficient use of existing resources, which saves you IT costs
- Reduce or limit the costs of procuring and managing virtual machines.
- Reduce or limit the variations in the deployment and configurations of virtual machines
The RapidCompute custom portal is equipped with a multitude of features to help you get the most out of your resources and utilize them efficiently.

Open APIs
Native Integration with applications and databases.

Scheduler
Run your jobs on simple or complex recurring schedules.

Flexibility
Make your own security credentials and instances.

Load Balancers
Increase capacity and reliability of applications.

Elastic Computing
Quick scale capacity as your computing requirements change.

Auto Scaling
Auto Scaling of resources of maximum uptime and efficiency.

Resources & Threshold Monitoring
Complete control and updates of your CPU. Ram and network utilization.
Billing
At RapidCompute you pay for what you consume. Customers pay on a per-use basis, typically by the hour. With us you pay only for what you need – no standard bundled servers, no lock-ins, no out of bundle extras.
- You specify your processing resources required for your server or multiple servers:
- CPU in core GHz
- Memory in GB (charged by GB per hour)
- Disk in GB (charged by GB per month)
- You add your networking requirements:
- Data transfer requirement in GB (charged in GB transferred)
- Static IPs (charged by no of IPs per month)
- VLAN’s (charged by no of VLANs per month)
If required, you add any additional licensing. These can vary on per user, per month or per year basis.
