Overview

For midsize organizations, the Virtualization Stack can be scaled to include multiple nodes. This configuration allows more flexibility in the allocation of resources. Hypervisor nodes can be specifically tailored to maximize effect of the hosted assets, configured to maximize speed and performance or storage and resilience. It is also possible to distribute clustered nodes across several remote sites with high-speed connectivity. As assets are virtualized, they are not dependent on specific host hardware and can easily be backed up or migrated to another host system. This allows an organization to avoid vendor lock-in and be assured that the hardware and all virtual solutions will be able to grow as workflow requirements change while assuring continuity of business.

Network

Configurable in either subnet form or as a primary organizational LAN, connectivity and access is customized to an organization’s needs. Console access is provided via the web interface and HTTPS. Assets that do not require graphical access are available via the network.

Processing

All hypervisor nodes utilize modern, typically Intel Xeon processors. Virtual CPUs, known as vCores, are how we quantify the CPU cores used by a virtual host. A single node can support up to 2 physical CPUs providing 48 vCores.

Memory

Modern error correcting server RAM aids in preserving data integrity. Typically configured with 64GB of memory, nodes can be built with 32-256GB of RAM as needed.

Storage

Tarvos hypervisor nodes utilize 2.5″ hotswap bays for easy storage maintenance. Each hotswap bay can support up to a 4TB SSD, with internam NVME storage being an availabe expansion option. Internal 3.5″ HDDs can also be configured supporting up to 48TB of storage.

Backup & Recovery

Backups of virtual resources are taken in intervals depending on operational requirements of the resource. In the event of a critical failure the average time for a system to be restored to operation is 90 minutes.

CPU/vCores

16-88 vCores
*per node

Memory

32-1024GB

Storage

SSD 3-24TB*
HDD 6-48TB*

*RAID1

Network

Ethernet
1-2.5Gbps
Fiber
10-100Gbps

Backup

HDD 6-24TB*

*RAID1

Maintenace

Standard parts to ensure global availability

Click models for further details

Windows Virtual Workstation

Leverage the benefits of a full Windows workstation from any web browser on any device. As more of the workforce transitions to a work-from-home arrangement, virtual workstations are an excellent and cost-effective way to provide your staff with a company computer. As virtual workstations exist in an on-prem hypervisor cluster, this greatly improves data security and makes keeping data within an organization’s network far simpler.

Linux Virtual Workstation

The Linux operating system is responsible for running over 96% of servers on the web. Linux is chosen for its security, expandability, and ability to leverage the open source community for powerful software. Over the past decade, desktop Linux has evolved into a highly usable workstation operating system. By far the best choice when it comes to scientific and research teams, desktop Linux has also proven to be an effective choice for common office use cases.

Ephemeral Virtual Workstation

For workflows which require special attention to operational security, organizations may choose to utilize Ephemeral workstations. These virtual machines run Linux, are rebuilt to a clean state on each boot, and retain ZERO data. These live Linux distributions have full-featured privacy tools built in, Tor Browser, KeePassXC, OnionShare and others. By default, it does not provide persistent storage, though one can be configured.

Private VPN Server

It is now common knowledge that using a VPN offers added privacy and security to an organization’s online activity. VPNs come in many different designs and configurations, and public VPNs have become popular, with millions of users they are good for mixing internet traffic and obfuscating origin. However, IP addresses of publicly known VPNs are often blocked by governments and organizations making access unpredictable. Our cloud VPN servers are deployed specifically for the client and have a random country-specific IP. This allows for an organization to have a private connection to another location, unregistered by organizations wishing to limit your internet access.

Cluster Health Monitoring

The health of your virtualization cluster is essential to smooth and sustainable operations, therefore early notice of issues is critical in identifying and rectifying issues before they become user impacting. Dedicated host-life monitoring can notify you of the early warning signs of hardware fatigue allowing corrective action to be taken as well as informing you of down services in real time.

Live Threat Monitoring

A sentinel server can be configured in many different ways and is able to scan for malicious incoming connections and failed access attempts to your resources. Similar to health monitoring, threat monitoring can give early warning to an asset under attack and allow your security team the best head start in taking protective action.

Private Chat / Video Conferencing

Video chat services like Zoom and others are controlled by outside entities, and this makes them susceptible to outside influence by either government or advertisers. Your data is mined to pay for the servers that host the service. As video conferencing has become an essential part of today’s workflow, having a conferencing server dedicated to your organization is an excellent way to reduce reliance on outside services and increase your privacy.

Encrypted Vault Server

File accessibility is essential for team productivity. Many small organizations rely on cloud storage such as Google Drive, Dropbox, and Microsoft Onedrive. Historically, all of these services put your data at risk, as your data is stored on the service provider’s servers. These providers have access to any file stored in their cloud, and can scan them or manipulate the data. Apple’s recently enacted policies allowing them to scan any file uploaded to iCloud are just one example of this. The best way to minimize risk of data compromise is for an organization to host file storage locally.

Private DNS Server

The public Domain Name System, or DNS, is responsible for translating a human readable URL, such as www.tarvos.io, to the IP address of the web server. Every time a user visits a website or follows a web link, a DNS query is made. As each query is logged with the IP of the origin, this is the number one way that internet activity is tracked. Hosting a private DNS server not only increases security for your organization, it also allows you to have custom DNS entries which may have been removed from public DNS if your organization is operating in a region with a restricted internet.

Ai-enhanced IP Camera Monitoring

Using the open-source system Zoneminder combined with an Nvidia CUDA capable GPU and OpenCV, we are able to deploy an AI-enhaced camera monitoring solution that is able to detect objects from multiple camera feeds in real time. This drastically decreases the frequency of false positives which can result from simple motion detection systems while augmenting dedicated security personnel.

Electronic Invoice System

Automating tedious and time consuming tasks is a huge step forward for any business, and easily justifies the cost of a technology refresh. Our Autobilling engine is designed to be easily deployed, requiring little workforce training to use. It is capable of reading PDF invoices printed to file from any management software and translating those invoices into stripe invoice links, which are then sent directly to the customer via SMS or email. This significantly reduces or eliminates the time staff has to spend reaching out to customers, as well as collecting and depositing checks.

Office PBX Phone Server

Virtualize your office phone infrastructure, with our virtual PBX server running on your infrastructure. With office phones being a central and critical part of daily operations, knowing that your infrastructure is scalable and protected will give organization management peace of mind. Disaster recovery is simple and can have your phone system back online within 30 minutes by restoring from a virtual snapshot that is collected daily.

Virtual Database Host

Databases are essential staples of advanced automation and modern workflows. Database servers and the access APIs used to submit queries require special considerations in respect to implementation and deployment. Tarvos has deployed multiple database servers that have enabled drastic improvements in organization and workflow automation. The combination of a database and a bespoke solution, can heavily augment an existing workforce, automating monotonous work, saving man-hours and improving employee quality of life.

Private Git Code Repository

For organizations with a software development team or which outsources their software development having an internal code repository allows for the organization to have greater control over their software and track the progress of ongoing development projects. This becomes especially important if an unintended leak of code would result in significant financial loss.

Bespoke Solutions

For use-cases requiring unique design elements outside the scope of our standardized solutions, we offer a bespoke development service. Our team has experience in database structures, networking, API design, storage and security. Our team has built and deployed over 70 customized solutions to address the various specialized needs of our clients. We are able to work with organizations to review specific workflows and design a strategy to eliminate inefficiencies and automate processes.

Email: inquiries@tarvos.io
Copyright 2017-2022