Virtual Vision

V2-logo

Infrastructure & Compliance

Facility

V2-solutions

Power

Security

Cooling

Our Services

enterprise

Worldwide Connections

Low latency connectivity

networking

Telco-grade Cloud

Networks and connectivity are pretty much high on the fly without delays. One-stop-shop for your telecom needs.

Facility e

100% Service Level Agreement

100% uptime reference point. x50 times credits against any downtime over 15 min. 1ms max latency internally in our clouds!

cloud-solutions

Secured & Protected

We deliver a high degree of security in accordance to various aspects of computing.

Facility

24x7 Local Support

Customer Support is available 24×7 through Ticketing System, Online Chat, Email and Phone.

Availability, Performance, Security

Availability, performance, and security are the cornerstones of V2’s infrastructure and managed services, thereby offering a 99.99% uptime SLA and end-to-end service experience to our customers.

World-class carrier neutral facilities and Infrastructure

Our carrier-neutral internet data centers have been designed using global standards. All mission-critical systems pertaining to daily operations have been sourced from best-of-breed platforms and vendors, and operate with minimum redundancy, enabling Virtual Vision (V2) to offer industry-leading uptime to our customers

A Complete 24X7X365 environment

Our carrier-neutral internet data centers have been designed using global standards. All mission-critical systems pertaining to daily operations have been sourced from best-of-breed platforms and vendors, and operate with minimum redundancy, enabling Virtual Vision (V2) to offer industry-leading uptime to our customers

V2 Cloud Security Capabilities

Virtual Vision (V2) data center in Riyadh is Tier III certified and PCI DSS compliant, providing high-performance architecture and Saudi hosting services with 24x7x365 support. This means that Virtual Vision ensures high-quality customer service and the certificate guarantees adherence to the standard. In addition, we endeavor to deliver a high degree of security and privacy for customers in accordance with the various aspects of their computing. This is reflected in the V2Cloud ISO-27001 certification. We regard this as a top priority and are committed to openness and transparency concerning our security procedures and policies.

V2-public-cloud

Network Security & Traffic Separation (Data in Transit)

V2’s Cloud leverages the open-source KVM hypervisor to fully separate all traffic between client accounts below the virtual machine level. No end-user can view traffic from any other end-user; this is achieved through full packet inspection of all incoming and outgoing packets to VMs by Linux KVM. KVM implements a virtual switch for every networking interface of each VM.

Storage Separation (Data at Rest)

Users can easily keep data private and secure using two different approaches. The first approach is to ensure that the operating system/file structure is fully encrypted using KVM for Linux distributions or Truecrypt for Windows environments. The second approach is to apply encryption to the drive on creation. This does eliminate the possibility of data leakage.

Two-Factor Authentication

V2 Cloud customers can use Google’s Two-step authentication to log onto their accounts.

Root Access & Operating System Security

Customers retain full access to their data at the file system level; the V2 Saudi Cloud system does not have access to VMs or drives. All customer data is handled automatically by our system.