Social Share




Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management efforts or service provider interaction. Enterprises can use these resources to develop, host and run services and applications on demand in a flexible manner in any devices, anytime, and anywhere.


Virtualization is technology that allows you to create multiple simulated environments or dedicated resources from a single, physical hardware system. Software called a hypervisor connects directly to that hardware and allows you to split 1 system into separate, distinct, and secure environments known as virtual machines (VMs). These VMs rely on the hypervisor’s ability to separate the machine’s resources from the hardware and distribute them appropriately.


Virtual Desktop Infrastructure,refers to the process of running a user desktop inside a virtual machine that lives on a server in the data center. It’s a powerful form of desktop virtualization because it enables fully personalized desktops for each user with all the security and simplicity of centralized management.

VDI enables customers to streamline management and costs by consolidating and centralizing the desktops while delivering end-users mobility and the freedom to access virtual desktops anytime, from anywhere, on any device.  It’s important to understand, however, that VDI is only one form of desktop virtualization.

Application & Service

application virtualization is a technology that essentially separates a piece of software from the operating system underneath. In a traditional software situation, a program would be installed locally on a hard drive and would be entirely dependent on the operating system of that machine. With application virtualization, the application still continues to interact with the operating system as if it were locally installed, but the boundary that was formerly created by a traditional installation is completely broken down. This brings with it a host of unique benefits that can’t be ignored.


Data Center

The data center is the department in an enterprise that houses and maintains back-end information technology (IT) systems and data stores—its mainframes, servers and databases. In the days of large, centralized IT operations, this department and all the systems resided in one physical place, hence the name data center. With today’s more distributed computing methods, single data center sites are still common, but are becoming less so.


Cisco and NetApp have developed the FlexPod platform to meet these demanding requirements. FlexPod is a data center platform that hosts infrastructure software and business applications in virtualized and bare-metal environments. The platform has been tested and validated across leading hypervisors and operating systems from VMware, Red Hat, and Microsoft and can be managed by FlexPod ecosystem partner software.


VSPEX is EMC reference architecture template for building converged systems, similar in intent to NetApp and Cisco FlexPod. These solutions give organizations choice as they more toward a more cost-effective virtual server environment, and they help provide a solid foundation on which to build a virtualized enterprise. Benefits of VSPEX: choice of simplified shared storage options, reduced cost approach, reduced risk, rapid deployment, excellent performance.


VMware NSX is a network and security virtualized platform. VMWare NSX was developed by VMware at 2012 after it was bought from Nicria cpmpany. The solution of network operation (control plan) separation from physical device ( data plan ) is similar to virtual server separation (VMs) from physical servers. NSX virtualize the network infrastructure devices namely switches, routers, ports and etc.

Virtual Infrastructure

A virtual infrastructure is a software-based IT infrastructure being hosted on another physical infrastructure and meant to be distributed as a service as in cloud computing’s Infrastructure as a Service (IaaS) delivery model. It provides organizations, particularly smaller ones, that cannot afford to build their own physical infrastructure, access to enterprise-grade technology such as servers and applications. The distribution is often done via the cloud, meaning over large networks such as the Internet.


A storage device is any computing hardware that is used for storing, porting and extracting data files and objects. It can hold and store information both temporarily and permanently, and can be internal or external to a computer, server or any similar computing device. Storage network technology has developed in the following three main configurations: Direct Attached Storage (DAS), Network Attached Storage (NAS), and Storage Area Networks (SAN).



Network Security is a branch of computer science that involves in securing a computer network and network infrastructure devices to prevent unauthorized access, data theft, network misuse, device and data modification. Another function of Network Security is in preventing DoS (Denial of Service) attacks and assuring continuous service for legitimate network users. Network Security involves proactive defence methods and mechanisms to protect data, network and network devices from external and internal threats.


A next-generation firewall (NGFW) is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by enforcing security policies at the application level, as well as at the port and protocol level.

Advance Malware Protection

AMP is an intelligence-powered, integrated enterprise-class advanced malware analysis and protection solution. You get comprehensive protection for your organization across the attack continuum: before, during, and after an attack.

Cloud Security

Cloud computing security addresses both physical and logical security issues across all the different service models of software, platform and infrastructure. It also addresses how these services are delivered (public, private or hybrid delivery model).

Policy & Access

Access, policies, application requirements, and privileges are the key points of IP network infrastructure security. policy management, and security considerations is our best expriences.

VPN Security Client

VPN (Virtual Private Network) is a generic term used to describe a communication network that uses any combination of technologies to secure a connection tunnelled through an otherwise unsecured or untrusted network1. Instead of using a dedicated connection, such as leased line, a “virtual” connection is made between geographically dispersed users and networks over a shared or public network, like the Internet. Data is transmitted as if it were passing through private connections.

Routing Security

Routing is one of the building blocks of the internet and networking. Routing availability and correctness are critical to correct Internet functionality. Since, there is a huge number of attacks against different routing protocols, routing security is the key challenge of network infrastructure.

Web Security

Web server security is the protection of information assets that can be accessed from a Web server. Web server security is important for any organization that has a physical or virtual Web server connected to the Internet. It requires a layered defense and is especially important for organizations with customer-facing websites.


Enterprise Networking

An enterprise network is an enterprise’s communications backbone that helps connect computers and related devices across departments and workgroup networks, facilitating insight and data accessibility. An enterprise network reduces communication protocols, facilitating system and device interoperability, as well as improved internal and external enterprise data management. An enterprise network is also known as a corporate network.


A wide area network (WAN) is a geographically distributed private telecommunications network that interconnects multiple local area networks (LANs). In an enterprise, a WAN may consist of connections to a company’s headquarters, branch offices, cloud services and other facilities. Typically, a router or other multifunction device is used to connect a LAN to a WAN. Enterprise WANs allow users to share access to applications, services and other centrally located resources.


Based on experiences, network edge consist of three main pats:
Interior Gateway Protocol (IGP) and techniques related to internal routing
Exterior Gateway Protocol (EGP) and techniques related to Boarder Gateway Protocol (BCP) or connection with the UpStream Service Provider
UTM and the security techniques related network edge such as Antiviruse, IPS, Firewall and etc.

Storage Networking

Storage networking is the practice of linking together storage devices and connecting them to other IT networks. Storage networks provide a centralized repository for digital data that can be accessed by many users, and they use high-speed connections to provide fast performance.

Routing & Switching

Routing and switching are the main functions of network for host to host communication. Switching the data packets between devices on the same network and route the packets between different networks can be achieve by switches and Routers respectively. The bases of all the networks related to techniques and protocols related to routing and switching.


Wireless is a communication technology that radio frequency wave and micro wave transmit the data between two devices. Devices such as hand phone, laptop, GPS, VSAT and PDA mostly used wireless for network communication.

Network Management

Network management refers to the broad subject of managing computer networks. There exists a wide variety of software and hardware products that help network system administrators manage a network. Network management covers a wide area, including: Security, Performance, Reliability



Collaboration is a joint effort of multiple individuals or work groups to accomplish a task or project. Within an organization, collaboration typically involves the ability of two or more people to view and contribute to documents or other content over a network.


VoIP, or Voice over Internet Protocol, is a method for taking analog audio signals, like the kind you hear when you talk on the phone, and turning them into digital data that can be transmitted over the Internet.VoIP can turn a standard Internet connection into a way to place free phone calls.

Web conferences

Web Conferencing is an online service by which you can hold live meetings, conferencing, presentations and trainings via the internet particularly on TCP/IP connections. You can connect to the conference either by telephone or using your computer’s speakers and microphone through a VoIP connection.

Online Training

Understanding eLearning is simple. eLearning is learning utilizing electronic technologies to access educational curriculum outside of a traditional classroom.  In most cases, it refers to a course, program or degree delivered completely online.


Terms of Use | Privacy

©2017 Faraz Aseman Shabake. and/or its affiliated companies.

References to "FAS Network"; may mean Faraz Aseman Shabake, or subsidiaries or business units within the FAS Network corporate structure, as applicable.

Materials that are as of a specific date, including but not limited to press releases, presentations, blog posts and webcasts, may have been superseded by subsequent events or disclosures.

All rights reserved.