HCI vs. UCI Data Sheet
HCI vs. UCI Data Sheet
Infrastructure (UCI),
HCI Evolved
[email protected] |Copyright © 2022 Verge.io, Inc.. All rights reserved. | www.verge.io.io 6.09a
SECURITY OVERVIEW
vSAN Integrity
The vSAN stores a cryptographic hash of every block of data written. When that data is
read, it is re-hashed and validated for integrity. This technique protects against silent
corruption and bit rot. In the event a bad block has been discovered, Verge.io checks for
redundant local copies. If none is found, Verge.io checks available DR/Backup sites in
real time. If found, the data block is repaired seamlessly, without user interaction, and
with no down time.
Encryption
Verge.io supports 256bit encryption at rest and in-transit within the environment and
externally. The API and web user interface use standard encryption which are not
optional.
Snapshots
Use snapshots to recover entire virtual data centers from a ransomware attack. Use
monitoring and logs to identify when the data was encrypted, then restore the snapshot
just before encryption. Resume operations in minutes.
Compliance
Use recipes to automatically create compliant virtual data centers. Recipes can
dramatically reduce complexity and cost to meet many compliance standards such as
HIPAA, HITRUST, FISMA, NIST 800.172, FIPS and Common Criteria and many more.
Encapsulation and Isolation
Each nested virtual data center is itself an entire own copy of the Verge.io operating
system and shares now instance with other virtual data centers. The result is highly
secure, highly portable, standalone virtual data centers.
[email protected] |Copyright © 2022 Verge.io, Inc.. All rights reserved. | www.verge.io.io 6.09a
SECURITY OVERVIEW
Verge.io Staffing
Verge.io can be managed and
administered by a few generalist IT
professionals with no multi-vendor
integration or coordination required.
A single simple, zero-downtime
crypto-verified patching schedule
means systems stay patched.
Use low-level disk monitoring to identify the massive data writes caused by
ransomware encryption. Restore a snapshot just prior to the encryption to
rescue your data from a ransom demand.
[email protected] |Copyright © 2022 Verge.io, Inc.. All rights reserved. | www.verge.io.io 6.09a
PATCHING VERGE.IO
The benefits of proper patching are well understood. Yet, for good reason,
patching often ends up as technical debt, left undone until some day in the
future “when there is more time.”
Patching
Traditional Stacks
Complex interactions
between the many
vendors’ patches
No easy way to test
patches in the lab
Requires multiple
specialists
Difficult to roll-back
when patching fails
Often requires
extended downtime
Patching Verge.io
Verge.io is one piece of software that only has Easy to rollback Automatic workload
one patch for the entire stack. Patching is migration for zero-
Can be done by downtime patching
easier and safer so it’s done more often
generalist IT staff
increasing the security profile of your IT stack. Encrypted distribution
One single patch assures safe patches
Repatriation
• Return workloads to your premise
while retaining the power of the
cloud.
• Avoid the anxiety and surprise of the
hyper-scalers unpredictable and
complex billing.
Our customers are providers of infrastructure to • Assure adherence to compliance
internal or external customers. Verge.io simplified and security standards
their environment reducing costs, increasing agility
and enabling new offerings. Typical Workloads
• Host legacy applications
• Cloud hosting
• Replace legacy hardware
• Honey-pot for testing
• Test / Dev environments
• Migrations
www.verge.io/test-drive
“Since installing Verge.io, we’ve seen a 50% reduction in hardware and software costs, twice the
monthly margin on each customer that converts, and at least a 30% reduction in daily support
tasks for our customers.” - Nate Battle; Managing Partner, Zebrahost, Inc.
Edge Servers
• Deliver entire virtual data centers to the
edge on minimum hardware with a
single software license.
• Built-in resiliency and remote
synchronization.
• Self-monitoring and self-healing data
storage maximizes life of hardware.
www.verge.io/test-drive
VDCs also allow for allocating specific computing and storage resources to particular departments,
preventing other departments from accessing those assets. IT can create a unique compliant IT
Infrastructure for each department as needed. Plus, the VDC provides flexibility to reallocate resources
when the department or workload no longer needs them, and IT can allocate more resources as a project
ramps up. Organizations can create a highly compliant VDC for regulated functions and a more general-
purpose VDC for other use cases.
https://verge.io/test-drive
[email protected] |Copyright © 2022 Verge.io, Inc.. All rights reserved. | www.verge.io 4.29
TECHNICAL OVERVIEW
[email protected] |Copyright © 2022 Verge.io, Inc.. All rights reserved. | www.verge.io 4.29