The Cloud can be a confusing term, with a range of meanings. At Xpertex we define the Cloud to be, “a range of capabilities that you rent or lease, but you don’t buy.” For instance, Software as a Service (SaaS) is a Cloud Service. Your Internet Service Provider is delivering Connectivity as a Service, which is a Cloud Service. The various data storage providers, such as DropBox™, are delivering Storage as a Service, again a Cloud Service.
Cloud Services are typically funded as part of a business’s Operational Expenditure, not Capital Expenditure.
The Cloud Service at Xpertex is a managed collection of Cloud component services in which all of the interfaces, protocols, traffic and qualities are configured, managed and controlled on your behalf by Xpertex. Everything that you need for your business is delivered as a service, and this includes Business Applications, VOIP collaborative communications, Email, storage, connectivity and security.
The Cloud Service Components
You will have some form of Internet, Wide Area Network (WAN) connectivity. You will typically have business connection which you will renew with an ISP on some scheduled basis, at whatever their rate is at the time. From time to time you will explore other ISPs in order to seek a better deal, but sometimes you will find that you may have won on cost and download speed, but inadvertently lost out on upload speed and connection quality. At Xpertex we secure outstanding WAN connectivity for our whole customer base. Additionally, we add strong firewall protection at the ISPs out-bound fibre end, enhancing the protection that our customers receive against malicious events.
Your Domain will be managed on the Xpertex hardware compute surfaces. We leverage our relationships with major hardware manufacturers to ensure that the compute surfaces are current, stable and the performance can be managed in such a way that we deliver the promised Quality of Service to our customers. As a result your Email, VOIP, document and file storage, databases, web sites, point-of-sale and back-end business applications will have the compute power and memory necessary for your business. Simplistically, as your business needs change, you flex your Cloud package by buying more or less; bandwidth, storage, memory, CPU. You decide on how you wish to balance priorities and we deliver to that agreed Quality of Service.
Business Continuity and Managed Services
Business Continuity provision is a part of our Managed Services, but Managed Services covers much more. With our Cloud Service you get the peace of mind that your business is protected, that data is secure, your users can work and your customers and suppliers can reach you. You get access to our four Managed Service Packages which you can scale and flex as your business needs change.
Cyber and Security
The UK Government seeks to make the UK one of the safest places to do business in cyberspace. We protect our Cloud Service with a cyber and security wrapper that fully adheres to the Cyber Essentials Plus, CESG Cyber Best Practices, ISO and HM Government requirements for cyber and security. Our history of working with Central Government departments has enabled us to ensure that we continue to strengthen and enhance our wrapper in a proactive manner, reducing your exposure to threats and business disruption, often without you even noticing that this is taking place.
Reducing Capital Expenditure could extend to not providing staff with company-owned computers, laptops, tablets and smartphones. Instead, users could be encouraged to buy their own devices and for them to use these in Bring Your Own Device (BYOD) office or home-working environment. Traditionally, this could result in significant security weaknesses and an increase in the porosity of defence with associated business risk. Additionally, users could be using applications that produce incompatible file formats, reducing productivity and effectiveness. An integral part of the Xpertex Cloud Service is our BYOD Integration Toolkit that consists of a small number of components that ensures file and data compatibility, closes the security risks and eliminates any porosities whilst not changing the status of the device from user-owned to company-owned.