First High Performance Cloud Benchmarks Unveiled

First High Performance Cloud Benchmarks Unveiled

Study highlights need for transparency in the cloud

Dallas – May 14, 2013 Until now, there have been very little verifiable, objective cloud performance benchmarks. FireHost, the secure cloud hosting company, has again bridged an important gap for enterprises that require a cloud they can trust before they’ll even consider moving production workloads to the cloud.  To give IT stakeholders some genuine, meaningful and independently verified data about cloud performance, FireHost and six other leading cloud hosting providers were benchmarked by an independent, third-party research firm in a series of extensive tests to provide a head-to-head comparison. FireHost created several impactful infographics that depict the market and business drivers for high performance cloud in healthcare, payments and more general IT environments.

As enterprises migrate to the cloud it is critical that they consider the right metrics that will have positive returns on investment without impairing performance in speed, flexibility, reliability, control, efficiency and costs,” said Chris Wiles, CTO of Zeta Compliance Technologies. “This kind of performance comes down to designing an infrastructure that is top spec in absolutely every department, which is why we chose FireHost as out hosting partner.”

Three factors were individually tested to measure server performance – processor, memory and storage – and each were evaluated working jointly during workloads for an overall server performance grade. A bare-metal dedicated server was used as a benchmark control. FireHost scored highest in all areas including overall server performance, outperforming Amazon Web Services EC2, Dell vCloud, HP Cloud, Microsoft Azure, Rackspace Cloud Express and Terremark vCloud. Only three out of the seven cloud providers scored higher than the dedicated server in average overall server performance*.

Performance is the game-changing metric that no one talks about because it’s difficult and expensive to measure,” said Todd Gleason, Director of Technology for FireHost. “Many cloud infrastructures were built with a single focus on price point, but FireHost serves enterprises with critical services that have more sophisticated considerations and realize that a number of factors beyond the invoice from your cloud hosting provider impact the total cost to own a IaaS solution.”

The performance benchmark study offers IT stakeholders a great deal of much needed transparency before committing to a fully managed IaaS provider. The report demonstrates that not all clouds are created equal and provides a baseline to help improve predictions on how critical, production applications will perform once in a cloud infrastructure. For example, the processor, memory and storage of a high performance cloud infrastructure can produce double the efficiency with fewer resources than commodity clouds. The total cost of ownership can be considerably lower with a high performance cloud, than with a lower performing, commodity cloud option as well.

FireHost has always carved a unique path in the secure cloud category, focusing first on enterprise-grade security and backing it up with a high performance cloud, demanded by enterprises for production workloads,” said Chris Drake, founder and CEO of FireHost.

Additional information on FireHost’s secure, high-performance cloud services and a copy of the benchmarking study can be obtained from FireHost.

*For overall server performance testing, the benchmark observed how the server groups fared using real-life workloads, measuring the holistic performance of coordinated operations between memory, processor and storage. The control server specifications included a Dell PowerEdge server configured with 16GB DDR3 1066Mhz memory, dual quad core Intel Xeon E5506 2.13GHz processors and 2.5” Seagate SAS 15K RPM drives.

About FireHost

FireHost offers the most secure cloud hosting available, protecting sensitive data and brand reputations of some of the largest companies in the world. With infrastructure built for security, compliance, performance and scalability, responsible businesses choose FireHost to reduce risk and improve the collection, storage and transmission of their most confidential data. Secure cloud servers, available in Dallas, Phoenix, London and Amsterdam, offer robust, geographically redundant business continuity options across all sites. Based in Dallas and funded by The Stephens Group, FireHost is the chosen secure cloud service provider for brands that won’t compromise on the security of their payment card and healthcare data. http://www.firehost.com.

Company Contact:

Cathi Lane
FireHost
cathi.lane@firehost.com
+1.877.262.3473 x. 8133

Editorial Contact:

Sarah Hawley
Ubiquity Public Relations
sarah@ubiquitypr.com
480.292.4640

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…