Cloud Hosting:

Cloud-based hosting focuses on uptime or keeping your website accessible to others on the internet, as well as on load management, which helps your site keep up with peaks and dips in usage without suffering from extended periods of downtime. This reliability is difficult to achieve in most traditional server hosting setups, but in cloud-based hosting, it is accomplished through a distribution of the resources that your website requires among a range of physical servers. As a result, your website or business does not require nearly as much on any single component of your server hardware network.

Although the term “cloud hosting” may seem rather vague, the process behind it is rather simple. In traditional web hosting solutions, a single server may be used to host a single website. In many cases, multiple websites will be hosted on a single server to save money. In a cloud-based hosting solution, however, things are reversed.

Rather than hosting one site on one server, a large number of individual servers are paired together to create what is called a cloud. There are several advantages to this setup. First of all, the overall amount of load is balanced between several different servers, which makes the website much better able to cope with increased load times or spikes in popularity.

At the same time, the amount of load on each server is greatly reduced, which allows the additional resources of those servers to be diverted toward other issues, including backups or helping to host other websites. Furthermore, if several individual servers are used to collectively host the site, then the individual power requirements of each server are proportionally reduced, meaning some older servers can be employed in cloud-based computing. Additionally, there is much greater flexibility for deployment and assignment of resources as they are needed, even as each physical server relies upon less for service provision.

In comparison to other types of hosting, cloud-based hosting is relatively new and as a result, it continues to evolve. As a result, some service providers have had difficulty getting out of their deployments. In particular, web host providers who work at the lower end are more likely to deploy websites on low-quality hardware that may not qualify for “cloud” hosting. Higher-quality cloud service providers will be more likely to deploy their sites and resources on enterprise-class hardware. In many situations, virtual hosting solutions may be used to increase the chances of end-users viewing the gains that they expect from cloud hosting.

Cloud Workspace

Supports mobile and telecommuting workforce

  •  Secure, instant access to files, applications and email from any public internet or private MPLS connection
  • Connect with any company owned or personal device

Highly secure infrastructure

  •  Protect your data from walking away on laptops and mobile devices
  • Certified security experts, infrastructure monitoring 24x7x365 for immediate remediation from viruses and other malware
  • SSAE 16 SOC 2 process controls and infrastructure
  • Customized security policies and directory permissions for all employees

Business Continuity

  • Fully redundant data storage and routine back-up
  • Disaster Recovery protection

Cost-effective Fortune 500 IT experience

  •  24x7x365 technical support
  • Fixed monthly fee per user

Customized Solution

  • Customized workspace environment
  • Customized applications
  • Access to more than 250 best-in-class applications
  • Unlimited installation and management of new applications

Cloud Disaster Recovery

Concentric Cloud Disaster Recovery Service is a managed service that enables you to rapidly recover your mission-critical data and systems in our cloud after a disaster. All you need is an Internet connection to remotely access your recovered systems and data in our secure, purpose-built cloud. Rapidly Recover Your Critical Systems and Data. Concentric Cloud Disaster Recovery Service backs up or replicates your system to the concentric cloud. When there’s a disaster, your critical systems are quickly recovered as virtual machines. With the 4-hour SLA option, the VMs are always on, receiving replicated data over the wire. So you can proactively failover your systems to the concentric cloud and gain quick, remote access to them whenever you choose.

Remotely Access Your Critical Systems in Our Purpose-Built Cloud Concentric Cloud Disaster Recovery Service hosts and protects your critical data in the concentric network of top-tier rated and SSAE-16 compliant or ISO-certified data centers. These facilities feature a virtualization platform for best-in-class redundancy and performance, high availability, and superior storage efficiency.

End-to-end encryption helps ensure your data remains private, satisfying regulatory- compliance requirements. We provide remote SSL VPN access, so as long as you can access the Internet you can securely recover data and applications from wherever you are located. And you will be able to access your critical systems and data in our cloud until your physical site is operational again.

Dedicated Server

More flexible and more secure than shared hosting, managed dedicated servers from Concentric Cloud Solutions provide you with the best possible return on your IT infrastructure investment. With a fully independent server dedicated solely to your operations, we can design its security, scalability, and performance specifications to match your unique business challenges. Whether your operations call for a simple managed to host solution with a single dedicated server or a multi-layer, complex managed to host design with application and database servers, Concentric has the experience to deliver reliable performance at any one of our Tier III facilities. Each of our high-security locations is equipped with redundant networks, redundant power, and 24×7 on-site technical experts. 

Cloud Server Backup

Cloud Server Backup offers remote, redundant, and automatic protection of your business’s mission-critical information assets. It’s a cost-effective, flexible, and easily scalable data-security solution that lets you configure and control your backup policies and procedures online. It can help you eliminate capital expenditures and reduce data center costs. Cloud Backup is a fully integrated, file-based backup solution that helps protect your data on cloud servers.

Cloud Backup is a FILE-BASED backup. This means that you can specify what folders or files to backup or restore. As usual, you can choose to backup or restore the whole system with all its folders, but the distinction with image backups is that the granularity of Cloud Backup is at the file level, as opposed to it being at the whole server image level.

Cloud Backup is also an INCREMENTAL backup tool in that it only copies the portion of the files that changed for those files that actually changed. This gives you some flexibility because, except your first complete backup, every subsequent backup is just a “delta” of the previous backup, which makes for faster backup and restores operations, and also reduces the storage required. As you probably know, image backups are not incremental: they copy the whole system every time.

Cloud Server Backup

Hosted Network Security:

Hosted Security is a fully managed suite of network-based security capabilities that is easy and cost-effective to deploy. The solution helps shield your infrastructure and applications from being compromised or disrupted by security threats.

Hosted Security leverages the industry’s top-ranked Unified Threat Management platform and multi-threat security services, and is engineered and supported 24/7 through a certified security partner. Your network security professionals can access centralized management reports from a unified security intelligence system.

Hosted Security is a robust suite of network-based security capabilities that can be easily and cost-effectively deployed to protect your enterprise network or the Internet connection at one or more of your locations. As part of your organization’s overall risk management strategy, Hosted Security helps you prevent unauthorized access to your network infrastructure, block access to inappropriate web content, and ensure secure use of your organization’s corporate IP-VPN network, or the Internet connection at one or more of your locations

With Hosted Security, your organization eliminates the need to buy and manage premise-based, security devices and appliances. Instead, you control companywide data security standards—and security experts monitor and manage the authorized use of your security policies. Using the security rules that your organization custom designs, Hosted Security helps you to:  

  • Identify and deflect Internet-based attacks to your company’s network*
  • Make better use of your Internet connection by blocking unwanted traffic
  • Block employees from accessing unauthorized websites
  • Provide employees with secured access to your company’s intranet environments*
  • Mitigate the risk of Internet hackers, malware or other malicious programs from compromising your company’s intellectual property or critical business applications
  • Maintain highly secure connections to your enterprise by providing the ongoing maintenance of security-related software updates and patches.*

Managed Premises Firewall:

Firewall and endpoint security services help keep unwanted traffic out of your network and vital data in. They help defend your network against unauthorized connections, allowing you to take full advantage of online business opportunities while reducing the risks of damaging attacks.

As attacks against corporate networks have become more sophisticated, so have firewalls. Once primarily a traffic gateway at the edge of the infrastructure, firewalls have evolved into cloud-based defenses that protect your network at its edge as well as vulnerable areas deeper in your network. They can also protect access points where remote devices like laptops and smartphones connect.

Firewall security services:

  •  Help block malicious traffic such as links to phishing websites
  • Integrate with other security programs to help stop worms, viruses and other incoming threats
  • Monitor outbound traffic to prevent sensitive data from being leaked
  • Help to better protect traffic from remote devices using endpoint security
  • Allow security policies to be implemented at your data center to help provide protection across your entire infrastructure

Secure Remote Access:

Secure remote access increases business productivity by enabling mobile employees, home workers, extranet partners, customers, and other authorized users to remotely access business-critical applications and resources over a VPN connection. Secure remote access solutions provide an alternative that offers greater levels of security, a greater range of access methods, a broader range of device support, and the ability to provide differentiated, identity-based access tailored to the needs of multiple communities of interest.


Secure Email:

Email Security cloud delivers always-on, inbound, and outbound messaging security, with effective and accurate antimalware, antispam, content filtering, and email encryption services from a global cloud platform. It is designed to provide 100% protection against known and unknown email viruses. Cloud helps protect organizations from email-borne viruses, malware, spam, phishing, targeted attacks, and bulk email, reducing the complexities of on-site technology. 

Email Encryption:

Email Encryption Provides end-to-end security for email and attachments, inside the enterprise to the desktop, at the enterprise gateway, and across leading mobile smartphones and tablets. The solution provides the confidence and peace of mind that sensitive data is protected in transit and storage, wherever it is in an email system to any inbox (e.g., Outlook, Lotus Notes, Gmail, and Yahoo), without disrupting existing email services or business processes.

This service integrates with your existing message infrastructure. The solution can be rapidly deployed for internal and external usage, even in the largest multi-national organizations.

This service employs proven Identity-Based Encryption (IBE) technology which enables global-scale deployments that are simple to manage and administer. Senders and receivers benefit from a simple user interface that makes secure messaging as easy and familiar as standard email communication.

Optional add-ons include restful API’s for powerful enterprise integration into applications and websites that rely on email-based processes, Large Attachment Delivery, Voltage Secure Mail Mobile Edition for native mobile support, archive and e-discovery plugins for supervisory access, and client plugins for Windows and Microsoft Office for transparent encryption inside the enterprise.

Compatible with enterprise messaging infrastructure and cloud email services such as Office 365, Voltage SecureMail allows organizations to achieve and maintain regulatory compliance and enforce best practices for email messages and attachments, without disrupting your existing email services or business processes.

Email Archive:

Email archiving is a critical requirement for every organization, but it’s more than just email storage for the sake of record-keeping and compliance. The smart buyer goes for an email archive solution that really works for you. It gives your users instant access to every email they’ve ever sent or received and it gives you central control of email retention policies. As much storage as you need, whenever you need it. No more email backups. 

A cloud-based platform stores all your email – internal and external – for as long as you want it, in a highly secure and resilient archive, giving you as much space as you need.

  •  Reduced costs to store email
  • A lighter load for your Exchange server
  • Greater productivity – with staff able to access archived email in real-time and without the need for technical support
  • No more user deletion or employees hoarding emails in PSTs
  • Your business need never risk losing important data due to server, storage, budgetary, or mailbox constraints.
  • Bottomless mailboxes for end users
  • Personal email archive access from MS Outlook via our standard MS Outlook interface
  • ‘Drag and drop’ between the Mime cast archive and Outlook
  • Near real-time search
  • Familiar personal folder structures presented in our secure webmail interface
  • Personal email archive access through Mobile devices; Android, Windows Phone, Windows 8/RT, iPhone, iPad and BlackBerry

Secure File Sharing Portal:

The File Sharing Portal makes it simple to share files internally as well as with external partners, clients, and vendors. From a single vendor to an entire department at a partner organization, this lets you quickly and simply share files (up to 2GB) with others even if they’re outside your firewall.

  • Send large files quickly and easily with a link
  • Create shared folders for ongoing content sharing
  • Share right from Outlook – with Box for Outlook

Sharing sensitive materials can be a well-founded cause for concern. Permission options and reporting capabilities give you comprehensive control over your content.

  •  Choose from six different permission types, including view or upload only
  • Allow anonymous uploading (perfect for managing any bidding process)
  • Schedule file deletion and link deactivation

Partners, vendors, clients –, you always know when anyone downloads, uploads, adds comments to, or starts a discussion about files. Bottom line: Everybody’s on the same page and you’re in control.

  •  Get instant file activity via email
  • Generate and export reports on file and user activity