SlideShare a Scribd company logo
www.ipserverone.com
IP ServerOne:
Managed
Cloud Service
Provider in
Malaysia
© Copyright IP ServerOne Solutions Sdn Bhd
Strategies for Seamless Recovery
in a Dynamic Data Landscape
Speaker: Simon Ng | Sales Director of IP ServerOne
MYNOG-11 CONFERENCE 2024
1 2 3 4
5 6 7 8
Over 70 employees
and counting
300 racks throughout
South East Asia
Managing over 7000
physical servers
A licensed Cloud Service
Provider under MCMC
Managing more than
5000 customers
Application’s Infrastructure
Data centers in MY, SG
and HK
ISO/IEC 27001
ISO/IEC 27017
SOC 2 Type II
PCI-DSS, CSA STAR-L1,
CSA STAR-L2
About Us
Our Story Our People Our Expansion Our Reliability
Our Credibility Our Customers Our Presence Our Security
Founded in 2003,
Over 2 decades of
success business
story
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
At IPSERVERONE, we're your approachable Managed
Cloud Services Provider that you can easily talk to.
We start by getting a deep understanding of your
business, so we can provide the ideal solution for you.
Who Are We
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Our Story
01
Discover the warmth and personalized care of our managed cloud
services, and let us show you how “We Host Better.”
21 Years Ago
Established Year
Product: Domain
name, Web Hosting
Head Count: Lone-
Ranger
Domain name, Web
Hosting, Dedicated
Server, and Co-location
Head Count: 15
Incubating Cloud
Hosting 2.0
Head Count: 30
The Start of Cloud
Hosting 1.0
Head Count: 30
• ISO27001 certified
• 1st colo provider in
Malaysia offers Cloud
Scrubbing
• Enabled Anti-DDoS to all
services
Head Count: 40
2003 2008 2013 2015 2016
Our Milestones
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
2017 2018 2019/2020 2021 2022
Our Milestones
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
• Setting up CJ1
Data Center
• Incubating Cloud
Hosting 3.0
Head Count: 48
• Start of CJ1 Data
Center operation
• PCI-DSS Certified
• Start of Cloud
Hosting 3.0
Head Count: 55
• Expansion of CJ1
Data Center space
on 3rd Floor
• Launch of VMware
Singapore
Head Count: 60
2019/2020 (Pandemic)
• Demand in Private
Cloud, Public Cloud,
IaaS
• ISO 27017 Certified
• VMware Cloud Verified,
launch of Object Storage
Head Count: 60
• Cloud demand
continues to increase,
#2 in revenue.
• SOC 2 Type II
Certified
• CSA STAR Level 1
Head Count: 60
• Launch of Cloud
Connect service
• Launch of Load
Balancer as a Service
• Stamped MOU with
UTAR
Head Count: 70
2023
The Data Landscape
02
A SIMPLE | FAST I SECURE
Managed Disaster Recovery Solution
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Types of Malware
Ransomware
Adware
Fileless
Malware
Trojan
Horse
Virus
Worms
Bots
Spyware
Rootkit
Keylogger
Spammy ads pop up
continuously
Uses non-file object
such as PowerShell
Attached to a file and executed
once file is launched. Infect other
programs
Spread itself but doesn’t
infect other programs
Pretends to be a
legitimate ones
Perform automated
task without requiring
any interaction
Encrypt data and holding it
until ransom is paid
Monitor user
activities
Gain control over a
target computer
Records of
everything you type
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Impact of Poor Security
Poor information security increases the risk
of data breaches, where unauthorized
individuals gain access to sensitive
information. The impact of data breaches
can be severe, leading to financial losses,
reputational damage, legal liabilities, and
loss of customer trust. Personal and
financial information exposed in data
breaches can also be used for identity theft,
fraud, or other malicious activities.
Inadequate information security can result
in non-compliance with data protection
laws and regulations. Organizations
failing to meet regulatory requirements
may face penalties, fines, legal actions,
and regulatory scrutiny. Compliance
failures can also lead to limitations on
conducting business in certain industries
or geographical regions.
Financial Losses
Inadequate information security measures
can result in financial losses for
organizations. These losses can arise from
direct costs, such as incident response,
forensic investigations, legal actions,
regulatory fines, and customer
compensation. Indirect costs may include
the loss of business opportunities,
customer churn, and damage to the
organization's brand and market value.
Data Breaches Legal and Regulatory Consequences
https://www.thestar.com.my/aseanplus/aseanplus-
news/2024/05/03/s039pore-law-firm-shook-lin--
bok-hit-by-cyber-attack-allegedly-paid-s189mil-in-
bitcoin-as-ransom
s 20(6) of the Cyber Security Bill 2024:"Any national critical
information infrastructure entity which contravenes
subsection (1), (2) or (3) commits an offence and shall, on
conviction, be liable to a fine not exceeding one hundred
thousand ringgit or to imprisonment for a term not
exceeding two years or to both.
https://www.hackread.com/dell-data-breach-hacker-
sells-customer-data/
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Impact of Poor Security
Financial Losses Data Breaches Legal and Regulatory Consequences
https://www.thestar.com.my/aseanplus/aseanplus-
news/2024/05/03/s039pore-law-firm-shook-lin--bok-hit-
by-cyber-attack-allegedly-paid-s189mil-in-bitcoin-as-
ransom
s 20(6) of the Cyber Security Bill 2024:"Any national critical
information infrastructure entity which contravenes
subsection (1), (2) or (3) commits an offence and shall, on
conviction, be liable to a fine not exceeding one hundred
thousand ringgit or to imprisonment for a term not
exceeding two years or to both.
https://www.hackread.com/dell-data-breach-
hacker-sells-customer-data/
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Insider Threat
Insiders with important
access to company
information that have been
compromised from the
outside.
Oblivious
Insider
Insiders that are usually
uneducated on potential
security threats, or simply
bypass protocol to meet
workplace efficiency.
Negligent
Insider
Insiders that steal data
intentionally or destroy
company property – such
as an employee that
deletes company data on
their last day of work.
Malicious
Insider
Insiders making a career of
exploiting company
network vulnerabilities, and
selling that information on
the dark web.
Professional
Insider
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Social Engineering
Phishing scams are email and text message campaigns aimed at
creating a sense of urgency, curiosity or fear in victims. It then
prods victim into revealing sensitive information, clicking on links to
malicious websites, or opening attachments that contain malware.
Phishing
Baiting attacks use a false promise to pique a victim’s greed or
curiosity. Baiting attacks may leverage the offer of free music or
movie downloads to trick users into handing their login credentials.
Baiting
Scareware involves victims being bombarded with false alarms and
fictitious threats. Users are deceived to think their system is
infected with malware, prompting them to install software that has
no benefit or is malware itself.
Scareware
How To Protect Data
At Workplace
qwerty123
!@#$%^&*
XR#LJ5lsf*bi
taylorswift
Strong password recommendation:
• Contain both upper-case and lower-case characters (e.g. a-z, A-Z)
• Contain digits and punctuation characters as well as letters (e.g. 0-9,
!@#$%^&*()
• At least eight alphanumeric characters long
• Not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc
Which of the
following password
safe to use?
1 2
3 4
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
The Trifecta of Data Recovery
People Infrastructure
Technology
People
• In-house/Outsource/Contract
Infrastructure
• Your own Data Center/Server Room/Outsource
Technology
• The Software/Hardware/Appliance you’re using
Our Product & Services
03
Providing a vast array of solutions to support
the demands of our customers.
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Product & Services Overview
IP ServerOne: What We Do
§ NovaCloud
§ Private Cloud
§ Bare-Metal Server
§ E-mail
§ Backup Storage
§ Disaster Recovery
§ DNS Hosting
§ Domain Name
1
CLOUD SERVICES
SUBSCRIPTION
§ Monitoring
§ Server Management
§ Database Management
§ Server Security
Management
§ Performance Optimization
2
MANAGED SERVICES
MAINTENANCE
§ Hardware & Software
§ Storage Solution
§ Virtualization
3
IT SOLUTIONS
DESIGN & DEPLOY
§ IP Transit
§ Anti-DDoS Protection
§ Co-location
§ Floor space
§ MYIX Satellite POP
§ Inter-Data Center
connection (DCI)
4
DATA CENTER
SUPPORT
Design
Uptime Institute Tier
III DC on Design
(TCCD)
Uptime Institute Tier
III DC on Constructed
Facility (TCCF)
ANSI/TIA-942
Rated-3
Green Building Index
(GBI) Certified
Security
PCI-DSS Compliant ISO/IEC 27001
Compliant
Threat, Vulnerability,
Risk Assessment
(TVRA)
Risk Management in
Technology (RMiT)
SOC 2 Type II
ISO/IEC 27017
Compliant
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Our Certifications
Acorn Recovery as a Service
04
A SIMPLE | FAST I SECURE
Managed Disaster Recovery Solution
When your security is B R E A C H E D!
Acorn Recovery is your
LAST LINE OF DEFENSE!
Recovery in minutes…
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Story Time:
Nature’s Inspiration for Acorn Recovery as a Service
SOURCE: https://www.ipserverone.com/the-acorn-story-natures-inspiration-
for-acorn-recovery-as-a-service/
Just like the tough shell of an acorn
protects the seed within, Acorn
Recovery employs robust security
measures and encryption protocols
to safeguard your critical data from
cyber threats. It’s like having a
fortress around your most valuable
assets.
1 Hard Outer Shell
Acorns are known for their nutrient-rich
composition, sustaining life in the natural
world. Similarly, Acorn Recovery offers a
bounty of features—rapid server recovery,
immutable storage, dual disaster recovery
centers, and a top-notch DR team—to keep
your business running continuously, even in
the face of adversity.
2 Nutrient-Rich
Ever tasted the bitterness of an
acorn? That’s thanks to tannins,
natural compounds that act as a
defense mechanism. Similarly,
our security features in Acorn
Recovery deter malicious actors
and safeguard your data from
exploitation. No bitter taste here,
just sweet security.
3 Tannins
Acorns have a nifty trick up their sleeve—a
dormancy mechanism that delays
germination until the time is right for
growth. Similarly, Acorn Recovery keeps
your critical data dormant and readily
available until needed for recovery. It’s like
having an ‘insurance’ policy for your digital
assets.
4 Dormancy Mechanism
Acorns spread their seeds through various dispersal methods, ensuring the survival of
oak trees. Likewise, Acorn Recovery disperses your data across multiple locations—
immutable cloud storage, off-site data centers, and redundant systems—to speed up
recovery, enhance resilience, and minimize the risk of data loss.
5 Dispersal Strategies
Acorn Recovery as a Service is a SIMPLE | FAST | SECURE
managed Disaster Recovery solution that’s designed to help
secure physical and virtual servers, ensuring uninterrupted
operations.
FAST
• Means fast server recovery in minutes
upon DR activation by customer.
• Fast to response with our 24/7 DR
team that follows the industry
standards like ISO, TVRA, BNM RMiT,
and SOC 2 Type II compliance.
SECURE
• Means your data is kept securely in TWO
separate Disaster Recovery Centers
(DRC).
• Added on with immutable storage; your
data stored is not susceptible to change.
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
What is Acorn Recovery
as a Service?
What do we mean by SIMPLE | FAST | SECURE?
SIMPLE
• Means our solution is user friendly
and easy to use.
• We provide simplified ransomware
recovery steps to customer, backed
by our experience DR team.
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
Unique Selling Points of Acorn Recovery
as a Service
• Time-lock storage
• Enhanced protection from
ransomware attack
1 Immutable Storage
• Standby Disaster Recovery for
faster Recovery Time Objective
(RTO)
2 Warm DR
• Dual DataCenter design
• DRC1 is in CJ1 | DRC2 in in AIMS
KL | or vice-versa
3 Dual DRC Design
• Our dedicated team will manage
the day-to-day of backup and
DR operations
4 Managed Backup and DR Services
• Veeam's SureBackup
technology offers a robust solution
for backup validation, ensuring that
backups are not only successfully
created but are also reliable for
restoration
5 Backup Verification
• 1x DR Drill included per year
• Inclusive of 10 days DR Activation
for DR Testing / DR Drill / Actual
DR
• DR Plan update based on
executed DR Drill activity
• DR Report inclusive activities,
timelines, actions taken, and
feedback
6 DR Drill
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
The Design of Acorn Recovery as a Service
ABC Company
Windows Server
Linux Server
DRC 1
DRC 2
Windows Server_Replica
Linux Server_Replica
Windows
Server Windows Server
Linux Server
WARM DR SITE
COLD DR SITE
Scope of Acorn Recovery as a Service
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
We provide round-the-clock
monitoring of backup and DR
systems to detect any operational
anomalies or issues.
1 Continuous Monitoring
Our team ensures immediate
response and resolution of any
incidents related to backup or DR,
minimizing downtime and
ensuring business continuity.
2 Incident Response
We maintain regular
communication with clients,
offering transparent status
updates and responsiveness to
any concerns or changes in
requirements.
3 Client Communication
and Reporting
We conduct thorough reviews of
backup and DR systems,
including assessment of hardware
health, software update status,
and configuration settings, to
optimize performance and
reliability.
4 System Review and
Planning
Our process ensures the integrity
and efficiency of backups,
identifying areas for performance
optimization and ensuring data
protection.
5 Backup Verification
We will conduct testing to validate
the effectiveness of DR plans and
ensure readiness for potential
disaster scenarios, minimizing
risks and maximizing recovery
capabilities.
6 DR Testing and
Readiness Evaluation
We apply scheduled
updates to backup and DR
software and hardware to
ensure systems are up-to-
date and continuously
enhance backup and DR
processes.
7 Maintenance and
Improvement
We assist customers
in activating the DR
virtual machine (VM)
to swiftly transition to
their disaster recovery
environment.
8 DR Activation
Assistance
We aid customers in
restoring the VM into
the DR VM or the Mini
Hypervisor we've
prepared for seamless
recovery.
9 DR Restoration
Assistance
We assist customers in
pointing IP addresses and
rerouting traffic to DRC1 or
DRC2 for uninterrupted
service during disaster
recovery.
10 Traffic Rerouting
We guarantee 99.9%
uptime for DR
infrastructure.
11
Service Level
Agreement
I
n
f
r
a
s
t
r
u
c
t
u
r
e
Technology
People
© Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
In Summary: SIMPLE | FAST | SECURE
1 People
3 Technology
1. Immutable Storage
2. Warm DR
3. Dual DRC Design
4. Managed Backup and DR Services
5. Backup Verification
6. DR Drill
Unique Features
2 Infrastructure
Discover the warmth and personalized care of our
managed cloud services, and let us show you how
“We Host Better.”
IP ServerOne Team
Thanks
WE HOST BETTER
+603-20261688
www.ipserverone.com
IP ServerOne Solutions Sdn. Bhd. (800140-T)
Unit 21-03, Level 21, IMAZIUM, No. 8, Jalan
SS21/37, Damansara Uptown, 47400 Petaling Jaya,
Selangor Darul Ehsan.

More Related Content

PPTX
Acorn Recovery: Restore IT infra within minutes
PDF
How We Protect Our Business in the Cloud (The Smart Way)
PPTX
Top 5 predictions webinar
PPTX
Best Practices for Cloud-Based IoT Security
PPTX
Cyber Security and its impact -17042025_ppt.pptx
PDF
White Paper: Protecting Your Cloud
PPTX
Webinar Mastering Microsoft Security von Baggenstos
PDF
The-Importance-of-Cybersecurity-in-Your-Business.pdf.pdf
Acorn Recovery: Restore IT infra within minutes
How We Protect Our Business in the Cloud (The Smart Way)
Top 5 predictions webinar
Best Practices for Cloud-Based IoT Security
Cyber Security and its impact -17042025_ppt.pptx
White Paper: Protecting Your Cloud
Webinar Mastering Microsoft Security von Baggenstos
The-Importance-of-Cybersecurity-in-Your-Business.pdf.pdf

Similar to Strategies for Seamless Recovery in a Dynamic Data Landscape (20)

PPTX
Rik Ferguson
PPTX
Key Capibilities.pptx
PPT
Implementing an improved security for collin’s database and telecommuters
PDF
2021 01-27 reducing risk of ransomware webinar
PDF
Trusted Cloud
PDF
Novaquantum advanced security for Microsoft 365
PDF
Cloud Computing
PPT
ICRTITCS-2012 Conference Publication
PDF
Cloud Security: Perception Vs. Reality
PPTX
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
PPTX
UCloud Asia Company Presentation
PPSX
Transformationplus Cyber Security Offering v10
PPTX
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
PDF
CYBER-i Corporate Dossier
PPTX
Cloud vs. On-Premises Security: Can you afford not to switch?
PPTX
Practical Security for the Cloud
PDF
The Secure Path to Value in the Cloud by Denny Heaberlin
PDF
Protect your guest wifi - NOW
PDF
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
PPTX
EMEA What is ThousandEyes? Webinar
Rik Ferguson
Key Capibilities.pptx
Implementing an improved security for collin’s database and telecommuters
2021 01-27 reducing risk of ransomware webinar
Trusted Cloud
Novaquantum advanced security for Microsoft 365
Cloud Computing
ICRTITCS-2012 Conference Publication
Cloud Security: Perception Vs. Reality
UCloud Asia Company Presentation - How to prevent Ransomware and Phishing att...
UCloud Asia Company Presentation
Transformationplus Cyber Security Offering v10
1C_-_Treasury_Managemt_in_the_Cloud_.pptx
CYBER-i Corporate Dossier
Cloud vs. On-Premises Security: Can you afford not to switch?
Practical Security for the Cloud
The Secure Path to Value in the Cloud by Denny Heaberlin
Protect your guest wifi - NOW
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
EMEA What is ThousandEyes? Webinar
Ad

More from MyNOG (20)

PDF
MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
PDF
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
PDF
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
PDF
Building a Connected Future: The Power of Interconnection
PDF
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
PDF
SRv6: DEPLOYMENT & USECASES by Aditya Kaul
PDF
Peering Personal MyNOG-10
PDF
Embedded CDNs in 2023
PDF
Edge virtualisation for Carrier Networks
PDF
Equinix: New Markets, New Frontiers
PDF
Securing the Onion: 5G Cloud Native Infrastructure
PDF
Hierarchical Network Controller
PDF
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
PDF
Cleaning up your RPKI invalids
PDF
Introducing Peering LAN 2.0 at DE-CIX
PDF
Load balancing and Service in Kubernetes
PDF
Cloud SDN: BGP Peering and RPKI
PDF
SDM – A New (Subsea) Cable Paradigm
PDF
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
PDF
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
MEASURING THE HEALTH AND RESILIENCE OF THE INTERNET: MALAYSIA
Malaysia’s Emerging Trends in Data Center: Identifying Tomorrow’s Hotspots
SHADOWSERVER: INTERNET CRITICAL SECURITY AS A PUBLIC SERVICE
Building a Connected Future: The Power of Interconnection
COHERENT OPTICAL TRANSCEIVERS – CURRENT CAPABILITIES AND FUTURE POSSIBILITIES
SRv6: DEPLOYMENT & USECASES by Aditya Kaul
Peering Personal MyNOG-10
Embedded CDNs in 2023
Edge virtualisation for Carrier Networks
Equinix: New Markets, New Frontiers
Securing the Onion: 5G Cloud Native Infrastructure
Hierarchical Network Controller
Aether: The First Open Source 5G/LTE Connected Edge Cloud Platform
Cleaning up your RPKI invalids
Introducing Peering LAN 2.0 at DE-CIX
Load balancing and Service in Kubernetes
Cloud SDN: BGP Peering and RPKI
SDM – A New (Subsea) Cable Paradigm
AI in Networking: Transforming Network Operations with Juniper Mist AIDE
Malaysia Data Center Landscape, Where is the next hotspot to place your fiber...
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Spectroscopy.pptx food analysis technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Machine Learning_overview_presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Approach and Philosophy of On baking technology
PDF
A comparative analysis of optical character recognition models for extracting...
Network Security Unit 5.pdf for BCA BBA.
Getting Started with Data Integration: FME Form 101
Spectroscopy.pptx food analysis technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine Learning_overview_presentation.pptx
Empathic Computing: Creating Shared Understanding
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Assigned Numbers - 2025 - Bluetooth® Document
SOPHOS-XG Firewall Administrator PPT.pptx
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Dropbox Q2 2025 Financial Results & Investor Presentation
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Approach and Philosophy of On baking technology
A comparative analysis of optical character recognition models for extracting...

Strategies for Seamless Recovery in a Dynamic Data Landscape

  • 1. www.ipserverone.com IP ServerOne: Managed Cloud Service Provider in Malaysia © Copyright IP ServerOne Solutions Sdn Bhd Strategies for Seamless Recovery in a Dynamic Data Landscape Speaker: Simon Ng | Sales Director of IP ServerOne MYNOG-11 CONFERENCE 2024
  • 2. 1 2 3 4 5 6 7 8 Over 70 employees and counting 300 racks throughout South East Asia Managing over 7000 physical servers A licensed Cloud Service Provider under MCMC Managing more than 5000 customers Application’s Infrastructure Data centers in MY, SG and HK ISO/IEC 27001 ISO/IEC 27017 SOC 2 Type II PCI-DSS, CSA STAR-L1, CSA STAR-L2 About Us Our Story Our People Our Expansion Our Reliability Our Credibility Our Customers Our Presence Our Security Founded in 2003, Over 2 decades of success business story © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
  • 3. At IPSERVERONE, we're your approachable Managed Cloud Services Provider that you can easily talk to. We start by getting a deep understanding of your business, so we can provide the ideal solution for you. Who Are We © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
  • 4. Our Story 01 Discover the warmth and personalized care of our managed cloud services, and let us show you how “We Host Better.”
  • 5. 21 Years Ago Established Year Product: Domain name, Web Hosting Head Count: Lone- Ranger Domain name, Web Hosting, Dedicated Server, and Co-location Head Count: 15 Incubating Cloud Hosting 2.0 Head Count: 30 The Start of Cloud Hosting 1.0 Head Count: 30 • ISO27001 certified • 1st colo provider in Malaysia offers Cloud Scrubbing • Enabled Anti-DDoS to all services Head Count: 40 2003 2008 2013 2015 2016 Our Milestones © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential
  • 6. 2017 2018 2019/2020 2021 2022 Our Milestones © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential • Setting up CJ1 Data Center • Incubating Cloud Hosting 3.0 Head Count: 48 • Start of CJ1 Data Center operation • PCI-DSS Certified • Start of Cloud Hosting 3.0 Head Count: 55 • Expansion of CJ1 Data Center space on 3rd Floor • Launch of VMware Singapore Head Count: 60 2019/2020 (Pandemic) • Demand in Private Cloud, Public Cloud, IaaS • ISO 27017 Certified • VMware Cloud Verified, launch of Object Storage Head Count: 60 • Cloud demand continues to increase, #2 in revenue. • SOC 2 Type II Certified • CSA STAR Level 1 Head Count: 60 • Launch of Cloud Connect service • Launch of Load Balancer as a Service • Stamped MOU with UTAR Head Count: 70 2023
  • 7. The Data Landscape 02 A SIMPLE | FAST I SECURE Managed Disaster Recovery Solution
  • 8. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Types of Malware Ransomware Adware Fileless Malware Trojan Horse Virus Worms Bots Spyware Rootkit Keylogger Spammy ads pop up continuously Uses non-file object such as PowerShell Attached to a file and executed once file is launched. Infect other programs Spread itself but doesn’t infect other programs Pretends to be a legitimate ones Perform automated task without requiring any interaction Encrypt data and holding it until ransom is paid Monitor user activities Gain control over a target computer Records of everything you type
  • 9. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Impact of Poor Security Poor information security increases the risk of data breaches, where unauthorized individuals gain access to sensitive information. The impact of data breaches can be severe, leading to financial losses, reputational damage, legal liabilities, and loss of customer trust. Personal and financial information exposed in data breaches can also be used for identity theft, fraud, or other malicious activities. Inadequate information security can result in non-compliance with data protection laws and regulations. Organizations failing to meet regulatory requirements may face penalties, fines, legal actions, and regulatory scrutiny. Compliance failures can also lead to limitations on conducting business in certain industries or geographical regions. Financial Losses Inadequate information security measures can result in financial losses for organizations. These losses can arise from direct costs, such as incident response, forensic investigations, legal actions, regulatory fines, and customer compensation. Indirect costs may include the loss of business opportunities, customer churn, and damage to the organization's brand and market value. Data Breaches Legal and Regulatory Consequences https://www.thestar.com.my/aseanplus/aseanplus- news/2024/05/03/s039pore-law-firm-shook-lin-- bok-hit-by-cyber-attack-allegedly-paid-s189mil-in- bitcoin-as-ransom s 20(6) of the Cyber Security Bill 2024:"Any national critical information infrastructure entity which contravenes subsection (1), (2) or (3) commits an offence and shall, on conviction, be liable to a fine not exceeding one hundred thousand ringgit or to imprisonment for a term not exceeding two years or to both. https://www.hackread.com/dell-data-breach-hacker- sells-customer-data/
  • 10. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Impact of Poor Security Financial Losses Data Breaches Legal and Regulatory Consequences https://www.thestar.com.my/aseanplus/aseanplus- news/2024/05/03/s039pore-law-firm-shook-lin--bok-hit- by-cyber-attack-allegedly-paid-s189mil-in-bitcoin-as- ransom s 20(6) of the Cyber Security Bill 2024:"Any national critical information infrastructure entity which contravenes subsection (1), (2) or (3) commits an offence and shall, on conviction, be liable to a fine not exceeding one hundred thousand ringgit or to imprisonment for a term not exceeding two years or to both. https://www.hackread.com/dell-data-breach- hacker-sells-customer-data/
  • 11. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Insider Threat Insiders with important access to company information that have been compromised from the outside. Oblivious Insider Insiders that are usually uneducated on potential security threats, or simply bypass protocol to meet workplace efficiency. Negligent Insider Insiders that steal data intentionally or destroy company property – such as an employee that deletes company data on their last day of work. Malicious Insider Insiders making a career of exploiting company network vulnerabilities, and selling that information on the dark web. Professional Insider
  • 12. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Social Engineering Phishing scams are email and text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then prods victim into revealing sensitive information, clicking on links to malicious websites, or opening attachments that contain malware. Phishing Baiting attacks use a false promise to pique a victim’s greed or curiosity. Baiting attacks may leverage the offer of free music or movie downloads to trick users into handing their login credentials. Baiting Scareware involves victims being bombarded with false alarms and fictitious threats. Users are deceived to think their system is infected with malware, prompting them to install software that has no benefit or is malware itself. Scareware
  • 13. How To Protect Data At Workplace
  • 14. qwerty123 !@#$%^&* XR#LJ5lsf*bi taylorswift Strong password recommendation: • Contain both upper-case and lower-case characters (e.g. a-z, A-Z) • Contain digits and punctuation characters as well as letters (e.g. 0-9, !@#$%^&*() • At least eight alphanumeric characters long • Not a word in any language, slang, dialect, jargon, etc. • Are not based on personal information, names of family, etc Which of the following password safe to use? 1 2 3 4
  • 15. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential The Trifecta of Data Recovery People Infrastructure Technology People • In-house/Outsource/Contract Infrastructure • Your own Data Center/Server Room/Outsource Technology • The Software/Hardware/Appliance you’re using
  • 16. Our Product & Services 03 Providing a vast array of solutions to support the demands of our customers.
  • 17. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Product & Services Overview IP ServerOne: What We Do § NovaCloud § Private Cloud § Bare-Metal Server § E-mail § Backup Storage § Disaster Recovery § DNS Hosting § Domain Name 1 CLOUD SERVICES SUBSCRIPTION § Monitoring § Server Management § Database Management § Server Security Management § Performance Optimization 2 MANAGED SERVICES MAINTENANCE § Hardware & Software § Storage Solution § Virtualization 3 IT SOLUTIONS DESIGN & DEPLOY § IP Transit § Anti-DDoS Protection § Co-location § Floor space § MYIX Satellite POP § Inter-Data Center connection (DCI) 4 DATA CENTER SUPPORT
  • 18. Design Uptime Institute Tier III DC on Design (TCCD) Uptime Institute Tier III DC on Constructed Facility (TCCF) ANSI/TIA-942 Rated-3 Green Building Index (GBI) Certified Security PCI-DSS Compliant ISO/IEC 27001 Compliant Threat, Vulnerability, Risk Assessment (TVRA) Risk Management in Technology (RMiT) SOC 2 Type II ISO/IEC 27017 Compliant © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Our Certifications
  • 19. Acorn Recovery as a Service 04 A SIMPLE | FAST I SECURE Managed Disaster Recovery Solution
  • 20. When your security is B R E A C H E D! Acorn Recovery is your LAST LINE OF DEFENSE! Recovery in minutes…
  • 21. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Story Time: Nature’s Inspiration for Acorn Recovery as a Service SOURCE: https://www.ipserverone.com/the-acorn-story-natures-inspiration- for-acorn-recovery-as-a-service/ Just like the tough shell of an acorn protects the seed within, Acorn Recovery employs robust security measures and encryption protocols to safeguard your critical data from cyber threats. It’s like having a fortress around your most valuable assets. 1 Hard Outer Shell Acorns are known for their nutrient-rich composition, sustaining life in the natural world. Similarly, Acorn Recovery offers a bounty of features—rapid server recovery, immutable storage, dual disaster recovery centers, and a top-notch DR team—to keep your business running continuously, even in the face of adversity. 2 Nutrient-Rich Ever tasted the bitterness of an acorn? That’s thanks to tannins, natural compounds that act as a defense mechanism. Similarly, our security features in Acorn Recovery deter malicious actors and safeguard your data from exploitation. No bitter taste here, just sweet security. 3 Tannins Acorns have a nifty trick up their sleeve—a dormancy mechanism that delays germination until the time is right for growth. Similarly, Acorn Recovery keeps your critical data dormant and readily available until needed for recovery. It’s like having an ‘insurance’ policy for your digital assets. 4 Dormancy Mechanism Acorns spread their seeds through various dispersal methods, ensuring the survival of oak trees. Likewise, Acorn Recovery disperses your data across multiple locations— immutable cloud storage, off-site data centers, and redundant systems—to speed up recovery, enhance resilience, and minimize the risk of data loss. 5 Dispersal Strategies
  • 22. Acorn Recovery as a Service is a SIMPLE | FAST | SECURE managed Disaster Recovery solution that’s designed to help secure physical and virtual servers, ensuring uninterrupted operations. FAST • Means fast server recovery in minutes upon DR activation by customer. • Fast to response with our 24/7 DR team that follows the industry standards like ISO, TVRA, BNM RMiT, and SOC 2 Type II compliance. SECURE • Means your data is kept securely in TWO separate Disaster Recovery Centers (DRC). • Added on with immutable storage; your data stored is not susceptible to change. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential What is Acorn Recovery as a Service? What do we mean by SIMPLE | FAST | SECURE? SIMPLE • Means our solution is user friendly and easy to use. • We provide simplified ransomware recovery steps to customer, backed by our experience DR team.
  • 23. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential Unique Selling Points of Acorn Recovery as a Service • Time-lock storage • Enhanced protection from ransomware attack 1 Immutable Storage • Standby Disaster Recovery for faster Recovery Time Objective (RTO) 2 Warm DR • Dual DataCenter design • DRC1 is in CJ1 | DRC2 in in AIMS KL | or vice-versa 3 Dual DRC Design • Our dedicated team will manage the day-to-day of backup and DR operations 4 Managed Backup and DR Services • Veeam's SureBackup technology offers a robust solution for backup validation, ensuring that backups are not only successfully created but are also reliable for restoration 5 Backup Verification • 1x DR Drill included per year • Inclusive of 10 days DR Activation for DR Testing / DR Drill / Actual DR • DR Plan update based on executed DR Drill activity • DR Report inclusive activities, timelines, actions taken, and feedback 6 DR Drill
  • 24. © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential The Design of Acorn Recovery as a Service
  • 25. ABC Company Windows Server Linux Server DRC 1 DRC 2 Windows Server_Replica Linux Server_Replica Windows Server Windows Server Linux Server WARM DR SITE COLD DR SITE
  • 26. Scope of Acorn Recovery as a Service © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential We provide round-the-clock monitoring of backup and DR systems to detect any operational anomalies or issues. 1 Continuous Monitoring Our team ensures immediate response and resolution of any incidents related to backup or DR, minimizing downtime and ensuring business continuity. 2 Incident Response We maintain regular communication with clients, offering transparent status updates and responsiveness to any concerns or changes in requirements. 3 Client Communication and Reporting We conduct thorough reviews of backup and DR systems, including assessment of hardware health, software update status, and configuration settings, to optimize performance and reliability. 4 System Review and Planning Our process ensures the integrity and efficiency of backups, identifying areas for performance optimization and ensuring data protection. 5 Backup Verification We will conduct testing to validate the effectiveness of DR plans and ensure readiness for potential disaster scenarios, minimizing risks and maximizing recovery capabilities. 6 DR Testing and Readiness Evaluation We apply scheduled updates to backup and DR software and hardware to ensure systems are up-to- date and continuously enhance backup and DR processes. 7 Maintenance and Improvement We assist customers in activating the DR virtual machine (VM) to swiftly transition to their disaster recovery environment. 8 DR Activation Assistance We aid customers in restoring the VM into the DR VM or the Mini Hypervisor we've prepared for seamless recovery. 9 DR Restoration Assistance We assist customers in pointing IP addresses and rerouting traffic to DRC1 or DRC2 for uninterrupted service during disaster recovery. 10 Traffic Rerouting We guarantee 99.9% uptime for DR infrastructure. 11 Service Level Agreement
  • 27. I n f r a s t r u c t u r e Technology People © Copyright IP ServerOne Solutions Sdn Bhd Private & confidential In Summary: SIMPLE | FAST | SECURE 1 People 3 Technology 1. Immutable Storage 2. Warm DR 3. Dual DRC Design 4. Managed Backup and DR Services 5. Backup Verification 6. DR Drill Unique Features 2 Infrastructure
  • 28. Discover the warmth and personalized care of our managed cloud services, and let us show you how “We Host Better.” IP ServerOne Team Thanks WE HOST BETTER +603-20261688 www.ipserverone.com IP ServerOne Solutions Sdn. Bhd. (800140-T) Unit 21-03, Level 21, IMAZIUM, No. 8, Jalan SS21/37, Damansara Uptown, 47400 Petaling Jaya, Selangor Darul Ehsan.