INFRASTRUCTURE AND SECURITY

Hyperscale infrastructure
available for everyone

Multiple infrastructure regions and availability zones hosted at maximum-security data centres. The infrastructure you’ve always dreamed of is now at your fingertips.

How it works
9 8 7 6 5 4 3 2 1 0
9 8 7 6 5 4 3 2 1 0
Data Centres
Data Centres
9 8 7 6 5 4 3 2 1 0
9 8 7 6 5 4 3 2 1 0
Availability Zones
Availability Zones
9 8 7 6 5 4 3 2 1 0
9 8 7 6 5 4 3 2 1 0
Regions
Regions
9 8 7 6 5 4 3 2 1 0
9 8 7 6 5 4 3 2 1 0
99
99
Service Availability
Service Availability

Our platform and data are hosted at highly efficient neutral data centres that boast the very best connectivity and security measures.

We only use cutting-edge centres in Europe and the Americas that are internationally recognised as leaders in technology and reliability.

To guarantee the best service, we work with sector leaders like Digital Realty, Equinix and Data4, whose data centres are designed according to the strictest security standards.

OUR ARCHITECTURE

At JOTELULU, our infrastructure is designed to include multiple layers of security to ensure reliability and proactively protect our cloud services. From system redundancy to advanced protection measures, our infrastructure guarantees business continuity for all our partners and customers.

We use efficient, high-security data centres strategically distributed across multiple regions to ensure an uninterrupted user experience. This global infrastructure allows our partners to bring their services closer to their customers while maintaining data residency and regulatory compliance, regardless of geographic location.

Our services use availability zones, which are physically separate locations within each region. These zones have independent power, cooling and network connections to ensure high availability and low-latency replication for critical applications. This design provides an unbeatable resilience against system failures and allows rapid and secure disaster recovery.

With JOTELULU, your cloud infrastructure is built on solid foundations that provide security, flexibility and world-class performance so you can adapt to your customers’ needs, wherever they are in the world.

Geographically distributed data centres allow our partners to reduce network latency and enable backups and failover with geographic redundancy.

LOCATIONS

When choosing the location of our data centres, we prioritise proximity to our partners to ensure minimum latency and optimum performance. The sites for our data centres are strategically chosen to mitigate risks such as flooding, extreme weather and seismic activity. Each availability zone is independent and physically isolated to guarantee resilience and protection against adverse situations.

Madrid Region, Spain [EU-MAD]
Paris Region, France [EU-PAR]
Querétaro Region, Mexico [AM-QRO]
AVAILABILITY

Our data centres guarantee 99.999% availability for our customers’ services thanks to our agreements with the most recognised and reliable data centres in the world, such as Digital Realty and Data4. These partners operate latest-generation facilities designed to provide maximum security, redundancy and uninterrupted availability, which, in turn, enables JOTELULU to deliver extremely reliable services.

Our business partners’ investment in these global operations guarantees that our infrastructure is robust and well-managed, with constant supervision, advanced network and sustainable practices that enhance energy performance. These data centres operate 24 hours a day, 7 days a week, 365 days a year, ensuring that our customers’ critical needs are always covered.

NETWORK REDUNDANCY AND DATA PROTECTION

Our infrastructure boasts multiple levels of redundancy and guarantee service continuity at all times. To minimise any interruption, we have redundant systems to protect critical facilities and ensure that data remains secure and accessible. Local redundancy at the disc level protects data within each region, while geographic redundancy extends this protection across various locations, improving data availability and security.

To ensure the reliability of our network connections, we use fibre optic links and redundant hardware to protect special components against potential failures. Furthermore, we use geographic replication to make sure that we always have a secure copy of data in alternative locations, maximising data durability and availability.

Data is synchronised regularly between different locations, while restore tests are performed regularly to validate the integrity of our backups.

CAPACITY

At JOTELULU, we continuously monitor the use of our services to ensure that we meet our commitments in terms of availability and the requirements of our users.

Our capacity planning model regularly evaluates system demand and the use of our infrastructure, and we carry out monthly reviews to anticipate future needs. This approach means that we can proactively adjust resources, taking into considering key factors such as data processing, telecommunications and the secure storage of audit logs.

POWER SUPPLY

The data centres supporting JOTELULU’S infrastructure are powered by 24/7 uninterruptible power supplies (UPS) and emergency power systems, which include local generators to provide backup power. The UPS and generators are regularly tested and maintained to ensure that they are in full working order. In addition, we have contractual agreements with local suppliers for rapid emergency fuel deliveries where necessary. Our data centres also have dedicated operations centres that constantly monitor the power system, including critical electrical components.

Electrical redundancy is a fundamental way of guaranteeing availability, through use of multiple power sources and backup systems, such as generators and UPS. In the event of a power cut, the UPS system activates immediately to maintain a supply of power until the generators come online. The generators then ensure a continuous supply of power during prolonged power cuts, maintenance tasks or emergency situations, with fuel reserves available in the event of a natural disaster.

ENERGY EFFICIENCY AND SUSTAINABILITY

At JOTELULU, we are fully aware of the amount of electricity consumed by our data centres, and we are committed to sustainability through the use of renewable energy. This approach allows us to considerably reduce our environmental footprint by minimising the CO₂ emissions associated with our operations, further contributing to a cleaner and more responsible future.

Our Operations team implements energy efficiency strategies that cover all aspects from the design of each facility to 24/7 continuous monitoring. We monitor electricity consumption, cooling systems and shared infrastructure to optimise efficiency and guarantee that every aspect of our operations is as environmentally friendly as possible.

In addition, we take active steps to compensate the CO₂ emissions that we generate, whether produced by electrical generators or by the travel required for daily operations.

As part of our overall commitment, we also work with other companies in the sector as part of initiatives like the European Climate Pact. This EU-led initiative sets ambitious targets to decarbonise digital infrastructure and achieve climate neutrality by 2030. In line with these objectives, we prioritise the use of renewable energy to contribute towards the sustainability of the sector.

FIRE PROTECTION AND FLOOD DAMAGE

At JOTELULU, we guarantee the safety of our facilities using advanced fire detection and suppression systems connected to isolated power sources to ensure they are operational at all times. Strategically located water sensors monitor potential water ingress or leaks and notify staff immediately to prevent damage.

Our facilities are also fitted with advanced smoke detectors and double interlock sprinkler systems to protect critical equipment. Daily inspections and continuous monitoring ensure that all security requirements are rigorously adhered to.

Our leak detection systems are equipped with alarms for rapid response, ensuring that both fires and floods are managed efficiently to protect our infrastructure and customer data.

ACCESS LOGS AND MONITORING

All access events and requests are logged and preserved as part of an electronic audit, enabling close control and the detection of anomalies to prevent unauthorised access. Our CCTV system monitors critical areas, such as entrances, cages, cabinets and perimeter areas, and recordings are kept for at least 90 days, unless otherwise required by law.

Physical access is continuously monitored by a security control team, supported by a CCTV system linked to the alarm system. Only authorised personnel can access our facilities and any equipment that enters or leaves the site is rigorously controlled. Any security events are logged in detail and analysed in order to devise corrective actions to strengthen security.

With CCTV and a 24/7 alarm system, JOTELULU guarantees maximum protection of its facilities and resources.

DATA CENTRE CERTIFICATIONS

At JOTELULU, our infrastructure is the foundation on which all our cloud services are built. It has been designed to deliver exceptional performance and constant availability. Each element of our infrastructure has been carefully deployed to satisfy the needs of even our most demanding partners and ensure maximum protection and efficiency at all times.

NETWORKS

Our network architecture ensures that our users enjoy high performance and a smooth, secure experience. We have designed a scalable, secure and highly available network to satisfy the needs of all tech companies that put their trust in us for their critical operations.

High-Performance LAN

JOTELULU’S internal network connects all key devices via high-speed links, ensuring rapid operations with no latency. Our spine-leaf architecture means there are multiple connection routes for each device, eliminating single-point failures and boosting network resilience. This means that, in the event of a device, failure, traffic will be automatically redirected to maintain service availability.

Global WAN

Our global WAN connects our local infrastructure to international locations and external networks to guarantee uninterrupted communications. By using multiple operators and redundancy routing, we can ensure high availability and a secure, constant connection. Furthermore, our integration with strategic internet exchange points optimises traffic and reduces latency to ensure rapid, stable access to our services.

Redundancy and Resilience for Service Continuity

JOTELULU’S infrastructure features multiple layers of redundancy. This includes alternative connections, backup power systems and a fibre-optic backbone that connects all our regions. This architecture ensures that our partners have continuous access to their services, no matter what happens.

Scalability and Flexibility through Network Virtualisation

To cater for the changing needs of our partners, we use network virtualisation technologies, such as VXLAN. This allows us to create flexible and scalable logic networks that adapt rapidly to new demands and provide agile and efficient resource provisioning.

Traffic Control and Optimisation

We combine core and edge routers to manage large volumes of traffic efficiently. Real-time monitoring systems allow us to anticipate potential problems and solve them before they affect our partners. This way, we can always guarantee the very best quality of service.

At JOTELULU we are committed to providing a network infrastructure that supports our partners’ growth by guaranteeing security, flexibility and unbeatable performance.

SERVERS

Our servers are designed to deliver optimum performance, reliability and security. They use the latest generation Intel processors to ensure exceptional computing power and enough capacity to efficiently manage intensive workloads. These advanced solutions allow our partners to run their applications smoothly, safe in the knowledge that they are supported by cutting-edge technology.

Redundancy for High Availability

Our server infrastructure is configured to provide redundancy at the cluster level and ensure that service is maintained even in the event of a component failure. Each host has two power supplies, each of which is connected to a different segment of the distribution network without the data centre building, guaranteeing constant protection against power cuts. Furthermore, our equipment features multiple high-availability network connections (LAGs), each connected to an independent switch to ensure service continuity in the event that a switch fails.

Enhanced Processing Power

Our servers boast exceptional processing power thanks to their latest-generation Intel processors that are optimised to handle complex workloads while ensuring maximum efficiency. These CPUs deliver high performance, low latency and improved computing capacity to guarantee that each process and application runs smoothly without interruptions.

Data Protection and Storage

Our servers have DDR5 ECC (Error-Correcting Code) memory, a latest-generation technology that ensures high performance levels and increased error-correction capabilities. This not only improves speed and energy efficiency but also helps prevent data corruption to guarantee a highly stable environment. With DDR5 ECC, we make sure that all operations are executed with maximum precision and security to minimise the risk of system failure.

Scalability and Failure Tolerance

Our infrastructure is designed to deliver a continuous, uninterrupted experience. We use hypervisors configured to ensure total redundancy. If one hypervisor fails, the virtual machines will be migrated and restart automatically on other active hypervisors. This approach guarantees that the service is always available and our partners’ operations are never compromised.

Hardening and Proactive Security

At JOTELULU, security is a top priority. That’s why our servers are always up to date with the latest security updates and are monitored constantly to detect and mitigate any anomaly or threat. We implement hardening and security techniques to minimise vulnerabilities and maintain a secure and reliable environment for our partners.

STORAGE

We use NetApp storage solutions, which are recognised for their performance and reliability, particularly in business settings. We use All Flash cabinets with NVMe technology and SSD disks, allowing us to deliver exceptional performance, low latency and high throughput for our partners. This solution is ideal for applications that require rapid and constant data access.

Benefits of ONTAP Technology

NetApp’s ONTAP operating system is at the heart of our data management system. This comprehensive platform provides a series of key benefits, including:

icon check
Efficient Storage: Features such as deduplication, compression and compactation optimise the use of space so more data can be stored in less physical space.
icon check
Flexibility and Scalability: ONTAP facilitates data management by making it possible to easily move and replicate data between different platforms.
icon check
Integrated Security: It includes advanced security measures to protect data against unauthorised access and external threats.
Geographically Distributed Backups and Replication

To guarantee data protection and availability, we create replicas on NetApp FAS or StorageGrid cabinets located in different geographic regions. This geographic distribution ensures that, in the event of an incident at one location, data will remain accessible from the other, thereby minimising the risk of data loss.

Protection against Ransomware

Data security is a top priority for us. NetApp provides robust solutions to protect against ransomware attacks. Using Snapshot technology, read-only copies of data are made which cannot be modified by ransomware. Furthermore, tools like FPolicy allow us to monitor and block suspicious activity in real time, offering an additional layer of protection.

PERIMETER SECURITY

Perimeter security ensures that all operations are protected against external threats. Adopting a proactive approach, we have deployed robust security infrastructure that protects all inbound and outbound connections.

Perimeter Firewalls: The First Line of Defence.

Our perimeter firewalls are designed to block unauthorised access and filter traffic according to defined security policies. This establishes an initial barrier of protection against potential threats. These advanced solutions analyse and control each packet of data that crosses our network, ensuring that only legitimate traffic can access our services and resources.

Intrusion Detection and Protection Systems (IDS/IPS)

To protect our networks even further, we use IDS/IPS systems that constantly monitor traffic for suspicious activity or attack patterns. These systems not only detect potential intrusions but also act in real time to mitigate threats that could compromise security. By identifying and blocking abnormal activity, we ensure that our infrastructure and our partners’ data is always protected.

Anti-DDoS Protection

Denial of Service attacks (DDoS) are an increasingly common threat for cloud operations. Our Anti-DDoS solution is designed to automatically identify and mitigate this type of attack. This helps to guarantee that services remain available without interruption, even when faced with massive attempts to saturate the network. This additional layer of protection ensures that legitimate traffic can flow unhindered while blocking any attempt to compromise availability.

Layered Security Infrastructure

Our perimeter security strategy is based on layered protection, combining multiple technologies and tools to provide a secure, reliable environment that adapts to the needs of our partners. From traffic analysis to threat detection and automatic blocking, each element of our infrastructure works in synthesis to provide a comprehensive defence against threats from insecure networks like the internet.

PLATFORM
Platform Security

The JOTELULU platform is designed to provide a secure and reliable environment that protects the integrity and availability of services. Our platform security combines advanced technologies, such as encrypted connections, multi-factor authentication, granular access permissions and constant 24/7 monitoring, so that our partners can operate with complete peace of mind that their data and operations are always secure.

Two-Factor Authentication (2FA)

Access security is essential for the JOTELULU platform. That’s why we have implemented two-factor authentication (2FA). This method requires users to provide two forms of identification to access the platform. Authentication is performed using a temporary access token generated on a mobile device, which must be entered along with a username and password. This process minimises the risk of unauthorised access and strengthens protection against phishing scams and other attacks.

Granular Roles and Permissions

Our platform makes it possible to set granular roles and permissions, providing partners absolute control over who can access their services and what they can do. This flexible access management system ensures that only authorised users can perform specific actions. In addition, we provide an event logging system so that a record of every action or change is maintained to provide real-time transparency and audit capacity.

Data Encryption for Additional Security

Data encryption is one of the main layers of security that we use to protect our partners’ sensitive information. The JOTELULU platform converts data into encrypted text using advanced encryption processes, ensuring that only authorised parties can de-encrypt and access information. Any attempt to access data without the correct encryption keys will be useless, protecting it against unauthorised access and external attacks.

24/7 Monitoring for Maximum Reliability

To ensure that we provide a stable and reliable service, we have a 24/7 monitoring and alert system that constantly monitors our infrastructure, including subsystems, compiling metrics, processing data in real time and checking service status. Constant monitoring means we can identify potential risks or malfunctions before they become an issue, thereby minimising downtime and guaranteeing a smooth, reliable service experience for our users.

REMOTE DESKTOP

Remote Desktop has been designed to ensure that it is a secure, reliable remote-working solution. Its security features cover multiple layers to guarantee that each connection and operation is protected against external threats and risks.

Perimeter Security and Specific Protection for Remote Desktop

The service is protected by an advanced perimeter security infrastructure that monitors and controls inbound and outbound traffic. This specific protection measure for Remote Desktop includes firewalls, Intrusion Detection Systems (IDS/IPS) and anti-DDoS measures to ensure that only secure traffic reaches our platform, further reducing exposure to cyberattacks.

Multi-Server, High-Availability Infrastructure

To ensure uninterrupted service, Remote Desktop operates on a multi-server infrastructure that guarantees high availability. This means that in the event of a server failure, the service is automatically re-directed to another available server, ensuring that our partners’ operations are unaffected.

Data Encryption (SSL)

Communications and data transfers are performed using SSL (Secure Sockets Layer) encryption, providing an additional level of protection and ensuring that data sent cannot be intercepted or manipulated. This approach guarantees data confidentiality in communications between the user and the platform.

Specific Restrictions for RemoteApp (Isolation)

To guarantee a secure environment, Remote Desktop uses specific restrictions for applications distributed through RemoteApp. This makes it possible to isolate each application and prevent it from interfering with other processes and services, further minimising the risk of exposing sensitive data.

Secure Access using Two-Factor Authentication (2FA)

Access to Remote Desktop is protected using a two-factor authentication system (2FA). This guarantees that only authorised users can access the environment by including an additional layer of security that requires a temporary access token, as well as a username and password.

Backups and Recovery

Remote Desktop uses a backup system with a fixed schedule to guarantee data protection:

icon check
Hourly Backups: Backups are made every hour with a retention period of 5 hours to guarantee rapid recovery.
icon check
Daily Backups: Backups are made every day at 00:10 with a retention period of 14 days.
icon check
Weekly Backups: Weekly backups are made at 00:15 on a Sunday with a retention period of 8 weeks.

Our Remote Desktop service also uses VSS (Volume Shadow Copy Service) technology to create snapshots of files or volumes on the server, even when they are in use. This provides additional protection for the server’s C drive, with two daily backups by default and 7% of the volume reserved for this purpose. Providing a robust and efficient backup layer, VSS guarantees that data is protected with no interruption to operations.

SERVERS
Dedicated Virtual Firewall with Geo-IP Features

Every JOTELULU network includes a dedicated virtual firewall that allows the user to apply personalised security rules, including IP filtering and Geo-IP capacity to restrict traffic based on country of origin. This feature allows precise control depending on the needs of each environment and provides robust protection against external threats.

Secure VPN and Private Networks for Complete Isolation

Our infrastructure allows secure VPN connections with support for Site-to-Site IPSec connections and Remote Access. This ensures that communications between different sites or users are always protected through encrypted tunnels. In addition, we use private networks that are fully isolated to guarantee that only authorised users can access resources.

Load Balancer and Security Optimisation

This feature operates as an efficient mechanism to distribute traffic between multiple virtual servers. It not only improves performance when handling large volumes of requests but also adds an additional security layer by controlling and filtering access, ensuring that traffic is managed in a secure and uninterrupted way.

Clusters with N+1 Redundancy for High Availability

The physical servers that host this service have N+1 redundancy to guarantee that there is always additional capacity to absorb the load in the event of a server failure. This ensures service continuity with no interruptions, even when the unexpected happens.

Server Backup Policy

Our servers are protected using snapshots (NetApp) according to the following schedule to guarantee rapid data recovery:

icon check
Hourly Backups: Backups are made every hour with a retention period of 5 hours to guarantee rapid recovery.
icon check
Daily Backups: Backups are made every day at 00:10 with a retention period of 14 days.
icon check
Weekly Backups: Weekly backups are made at 00:15 on a Sunday with a retention period of 8 weeks.

This combination of perimeter security, isolated networks, load balancing, N+1 redundancy and backup policies ensures that JOTELULU server environments are secure, reliable and ready for any situation.

FILE STORAGE

The JOTELULU File Storage service is designed to provide a secure, flexible and efficient data-handling solution, supported by the most advanced access control and protection measures. Our architecture guarantees that every file is protected at all times and that access to data is secure and monitored at all times.

Data Encryption for Maximum Protection

All data stored using the File Storage service is encrypted according to advanced security standards. This approach ensures that only authorised parties can access information and provides an additional layer of protection against potential attacks.

Customisable Permissions for Users and Groups

Access control and security are essential for secure data management. Our solution allows partners to set custom permissions at the user and group level. This ensures that users only have access to the files and folders they need. This not only improves security but also makes data management and access security easier to control.

Third-Party Document Sharing

The File Storage service provides the possibility of sharing documents with third parties securely over the internet. Shared documents can be protected with a password and an expiration date, ensuring that information is only accessible for the desired time period and is subject to strict security measures.

Backup Policy

To guarantee data integrity and availability, the JOTELULU File Storage service has a backup policy based on snapshots (NetApp) that adheres to the following schedule:

icon check
Hourly Backups: Backups are made every hour with a retention period of 5 hours to guarantee rapid recovery.
icon check
Daily Backups: Backups are made every day at 00:10 with a retention period of 14 days.
icon check
Weekly Backups: Weekly backups are made at 00:15 on a Sunday with a retention period of 8 weeks.
OBJECT STORAGE

JOTELULU’s Object Storage, based on the S3 protocol, is a secure, scalable and reliable solution for handling large volumes of data. With a focus on security and availability, Object Storage offers multiple features to guarantee protection and accessibility for every object stored.

Data Encryption

All objects stored are protected using advanced encryption. This guarantees that all data is encrypted, both in storage and when sent, ensuring confidentiality and protecting information against unauthorised access.

High Availability and Distributed Storage

Our high-availability infrastructure is geographically distributed to ensure that data is always available and protected against local failures or interruptions. With this approach, our service delivers optimum performance and is resilient against potential incidents.

Triple Replication for Greater Security

Each object stored in the Object Storage system is replicated on three different discs on three different servers. Our default policy ensures that at least one copy is kept at a different data centre, providing redundancy and protection against potential hardware failures or problems in a specific location.

File Versioning

Our service includes a versioning feature that can be activated from the subscription page on the platform. This allows the user to recover previous versions of objects and offers an additional layer of protection against undesired changes, losses or accidental modifications.

Granular Permissions and Access Control

This feature allows our partners to configure granular permissions for each object or set of objects. This guarantees that only authorised users can access, modify and manage data, providing precise and secure access control.

Perimeter Protection

The security we have implemented for our services includes perimeter protection measures that monitor and control inbound and outbound traffic. This guarantees that only authorised parties can access and interact with our system and adds an additional layer of defence against potential external threats.

Data protection and regulatory compliance are essential for JOTELULU. Our infrastructure and services are aligned with the main international regulations and certifications to ensure that all our data is managed according to the strictest standards.

If you need to check our complete Information Security Policy, you can do so through this link.

GDPR (General Data Protection Regulation) Compliance

The European Union’s General Data Protection Regulation (GDPR) establishes a strict framework for the protection of EU citizens’ personal data. As well as being a legal requirement, this regulation also guarantees privacy and user control over their data. By complying with the GDPR, we ensure that every data management process, from storage to processing, is carried out with the highest levels of transparency and security. This includes the obligation to manage data in an ethical way, protect data against unauthorised access and make tools available to users so they can exercise their data protection rights.

ISO 27001: The Information Security Standard

ISO/IEC 27001 is one of the most globally recognised information security certifications. What makes it special is its focus on Information Security Management Systems (ISMS). Such systems involve identifying, analysing and managing security risks using specific controls and policies. At JOTELULU, ISO 27001 certification means that our processes are designed to protect the confidentiality, integrity and availability of information while minimising risks and responding proactively to potential threats.

French Health Data Hosting (HDS)

Health Data Hosting (HDS) certification is specifically designed to guarantee data security and confidentiality with regards to the health data of French citizens. Issued by the French health agency, it requires strict measures to protect especially sensitive data. Having this certification demonstrates our commitment to the highest security standards, particularly in critical sectors like healthcare, where the protection of personal data is essential.

CISPE (Cloud Infrastructure Services Providers in Europe)

The CISPE Code of Conduct reinforces data protection for cloud services in Europe. This code specifically concerns cloud infrastructure providers and goes a step further than the GDPR by requiring data to be stored and processed exclusively within European territory, if requested by customers. This provides an additional level of control and security by ensuring that data is subject to the strictest European standards. By adhering to the CISPE, JOTELULU demonstrates its commitment to the highest possible standards on data protection and data sovereignty.

Data Sovereignty: Protection and Control in Every Territory

Data sovereignty is a concept whereby the management, storage and processing of data is carried out according to the jurisdiction in which it was generated. At JOTELULU, this means that our services are aligned with specific regulations, such as the GDPR in Europe, to ensure that data is processed according to strict privacy and protection policies.

For our partners, data sovereignty means they have total control over the location and processing of their data. This allows them to decide how and where to store their data and ensure that it remains in a jurisdiction that provides the necessary security guarantees and regulatory compliance. This approach strengthens user confidence and transparency, guaranteeing that all data is handled in an ethical, secure way in accordance with local regulations.

Data sovereignty is not just a legal requirement; at JOTELULU, it forms part of our commitment to data protection and control and providing a secure, reliable environment for all our partners.

Shared Responsibility Model
JOTELULU Shared Responsibility Model

The Shared Responsibility model is a fundamental framework for managing how cloud services work. Based on this model, the level of responsibility for each party will vary depending on whether the product is Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS).

Infrastructure as a Service (IaaS)

For JOTELULU products that provide infrastructure services (Servers), responsibilities are shared in the following manner:

Responsibility of the partner:
icon check
Data and Information
icon check
Identity and Account Management
icon check
Recovery and Backup Control and Configuration
icon check
Applications
icon check
Operating System (OS)
icon check
Network Controls and Firewall Rules
Responsibility of JOTELULU:
icon check
Hosting, Virtualisation and Storage
icon check
Infrastructure Network Controls
icon check
Data Centre
Platform as a Service (PaaS)

For JOTELULU products that are Platform as a Service (Remote Desktop), responsibility is shared as shown below (for some elements, like the operating system, responsibility is shared):

Responsibility of the partner:
icon check
Data and Information
icon check
Identity and Account Management
icon check
Recovery and Backup Control and Configuration
icon check
Applications
icon check
Operating System (OS)
icon check
Network Controls and Firewall Rules
Responsibility of JOTELULU:
icon check
Operating System (OS)
icon check
Hosting, Virtualisation and Storage
icon check
Infrastructure Network Controls
icon check
Data Centre
Software as a Service (SaaS)

For JOTELULU products that function as software (File Storage, Object Storage, Virtual PBX), responsibility is shared as follows:

Responsibility of the partner:
icon check
Data and Information
icon check
Identity and Account Management
Responsibility of JOTELULU:
icon check
Recovery and Backup Control and Configuration (except Object Storage)
icon check
Applications
icon check
Operating System (OS)
icon check
Network Controls and Firewall Rules
icon check
Hosting, Virtualisation and Storage
icon check
Infrastructure Network Controls
icon check
Data Centre