Applicable Scenario:
Scenario Features:
Recommended Solution:
Client Background:
The client is an integrated road, aviation, tourism, and finance state-owned single proprietorship investment enterprise. With the development of business, the level of enterprise informatization and digital construction faces the pressure of upgrade and iteration. To rationalize the investment in enterprise informatization construction, cloud computing services must be purchased to provide underlying support for various systems.
Customer Requirements:
Elastic expansion, on-demand use, security and reliability, and continuous iteration of the cloud computing platform.
1.Security and Reliability: The IDC where the cloud resources are located is standard and reliable, scientific and robust cloud platform structure, and the leased products such as cloud computing, cloud storage, cloud network are safe and stable.
2.Remote Disaster Recovery: Remote disaster recovery solutions with abundant cloud pool resources globally.
3.Business Migration: Migrate existing systems to the Unicom Cloud platform smoothly.
4.Operational Assurance: Professional after-sales and trouble shooting services.
Solution:
Unicom Cloud Capabilities: Standardized cloud products based on Unicom backbone cloud pool resourse.
Computing Resources: 900 vCPUs, 2896GB RAM
Storage Resources: 55TB; Network Resources:
Elastic IP, VPC, Shared Bandwidth
Backup: Remote disaster recovery
Migration Services and Solutions: Providing customized plan and testing for migrating the customer's legacy resource pools to the China Unicom's pool.
Disaster Recovery :Data backup and recovery, business system reconstruction, backup data archiving, and other capabilities to ensure operation resilience .
CloudBond
Experience one-click access to clouds across different regions and network environments supported by rich global resources, flexible and unified management, strong security and high reliability.
Learn more
Anti-DDoS
Our Anti-DDoS defense solutions provide professional security services for Internet private lines and IDCs, including attack monitoring, attack defense (traffic cleaning and blocking), attack source tracing, and customized defense schemes.
Learn more
SD-WAN
Centralize your network's configuration and monitoring over high-speed, wide bandwidth Internet rather than traditional dedicate lines. Realize the automatic configuration and fast networking of your terminal router and manage the terminal routers of all your users through a central controller.
Learn more