Clouds Infrastructure
Cloud infrastructure refers to the hardware and software components — such as servers, storage, a network and virtualization software — that are needed to support the computing requirements of a cloud computing model.
- Virtual Machine (Compute) Virtual Machines (VM) provide the basic IT Infrastructure that can be used by the Government Organizations to run their variety of workloads such as compute-intensive workload, memory-intensive workload, general-purpose workload, etc. All Virtual Machine packages, listed below, are Managed Virtual Machines. CSPs are required to list their prices on GeM platform keeping this in mind. ... Know more
- Storage Services The Storage services can be defined in various categories Object Storage, File Storage, Block Storage, and Archival Storage. The Managed Storage Services is a storage infrastructure that is provisioned keeping the user needs in mind. Service Scope The Storage services can be defined in various categories Object Storage, File Storage, Block Storage, and Archival Storage. The Managed ... Know more
- Office productivity suite This service provides Office coverage for desktop, laptop, tablets and smart phones (Android, iOS and Windows) with per user subscription install rights. There is no need to pay for version upgrades; updates are included in the subscription along with new features roll out regularly. Know more
- Identity and Access Management – Security Services This service may be used to authenticate and authorize users and computing resources within a network by assigning and enforcing security policies Know more
- Firewall (Virtual/ Physical) This service is used to monitor and control the incoming and outgoing traffic of a subnet by configuring some rules. Know more
- Managed Database as a Service (Advance) Database as a Service is a managed service offering by the Cloud Service Providers wherein in operating system and all low level components such as drivers, I/O, network, etc. are managed and optimized by the Cloud Service Providers. All objects created using “Database as a Service” are transparent to the underlying operating system. Activities such as OS management, antivirus, ... Know more
- Log Analysis This service may be used to generate insights from of the logs, by running queries against these logs. The service must retain the log for at least 30 days. Know more
- Hardware Security Module This service can be used where a dedicated hardware security module is required to create, manage and control keys. The HSM must comply with FIPS 140-2 Level 3 requirements. Know more
- Database Licences Siddhast offer database licenses to Government Organizations which they can use in that particular CSP’s Cloud environment. These are unmanaged databases. All these databases would have enterprise support included. Know more
- Container computer service Containers are the lightweight alternatives to Virtual Machines. Containers allow to encapsulate an application’s code, libraries, configuration and other dependent files into one single package. This packaging of the application and its dependent files offers improved developer productivity and environmental neutrality. The developers can continue focusing on improving/updating their applications without being worried about the ... Know more