Supplier Spotlight: StratusWorx

    04/13/2020 10:52 PM By Chuck F

    Much More than a Virtual Desktop

    Cloud 9 Supplier Spotlight:  StratusWorx

    Much more than a virtual desktop...  Simplify IT. Empower your Workforce. Increase Security.

    Empower your Workforce and set up your IT Environment in under 30-minutes

    Rather than building a laptop or PC for every employee, including customizing, supporting, upgrading and refreshing hardware and software to meet individual demands, IT administrators can quickly provision a virtual workspace with pre-licensed software in minutes that meets each employee’s unique requirements without the need for fancy machines.


    StratusWorX is a converged platform combining IaaS, PaaS, SaaS, Disaster Recovery and Security. Much more than a virtual desktop, StratusWorX delivers a fully managed IT environment in one easy-to-use cloud platform. The solution includes the fast provisioning of infrastructure, software, compute, active directory, security, and storage through a simple app-store menu that requires little to no IT expertise. 
    Cloud Workspace Technology

    StratusWorx hyper-fast, turnkey Cloud Workspace service can deliver right-sized compute workstations with applications, storage, security, and redundancy in minutes, accessible from any device. Running high-compute applications with StratusWorX offloads the strain on physical resources and eliminates the need for fancy high-cost machines. Users enjoy unparalleled application performance across the entire software spectrum, from Office 365 to compute-heavy applications like AutoCAD, SolidWorks, and SQL. Our proprietary AI engine automatically matches needed resources to application requirements without customer intervention. 

    More Than A Desktop. Fully Managed Infra, Software, Storage, Security And DR/Backup In One Easy-To-Use Interface.

    Simplify IT Management

    Zero-Touch,  Zero-Delay  Provisioning configure employee software, compute, security, storage, and redundancy in minutes, not hours or days


    Automate Software Licensing

    Select pre-licensed software in a simple app-store menu; assign users to roles for even faster provisioning of new employees


    Streamline  Hardware  Management 
    Stop provisioning and supporting employee devices and managing hardware refresh cycles


    Eliminate  Physical  Site  Maintenance 
    Stop maintaining and cleaning server rooms and data centers


    Increase Security and Backup Data 
    Radically reduce your attack surface and lock down the desktop; enable employees to securely store and share files, perform auto backups


    Consolidate Billing
    Consolidate billing for software and services across the organization

    Cut IT Infra Spend by 50%

    Simplify IT Budgeting

    Provide predictable, fixed IT expenses per employee; analyze spend by individual, department or location


    Cut Hardware Costs
    Stop purchasing servers; replace expensive employee hardware with low-cost devices and extend life cycles


    Only Pay for What You Use
    Right-sized compute for specific to each user. Stop overpaying for unmanaged software subscriptions and storage


    Lower  Connectivity  Spend
    Better analyze specific bandwidth consumption and identify more areas for cost reduction

    High-Compute, High-GPU Cloud Workspace

    Offload the strain on local resources for better performance. Minimize hardware costs.

    Create, Render, and Collaborate Faster in The Cloud Without The Need For Fancy Machines.  Provision Desktops In Minutes.

    Scale GPU for High-Compute Performance
    StratusWorX scales GPU based on workload specifications – from a single GPU core per Virtual Machine (VM) up to 16,384 GPU cores per VM. For even larger jobs, multiple VMs are chained together.

    Finish Compute-Intensive Tasks in Minutes, Not Days
    The StratusWorX proprietary AI engine automatically matches needed resources to application requirements without customer intervention, enabling even the most compute-intensive design and simulation software to run better and render faster in the cloud than on expensive, physical workstations.

    Increase Security and Back Up Data
    Lock down the desktop, while enabling workers to securely access, store, and share files. Perform auto-backups.

    Automate Software Licensing and Maintenance
    Select pre-licensed software in a simple app-store menu.  Keep applications current with automatic upgrades and patches. Configure employee software, compute, security, storage, and redundancy in minutes, not hours or days.

    Streamline Hardware Management
    Offload the strain on physical resources and eliminate the need for fancy machines by running high-compute applications in the cloud. Stop provisioning and supporting employee devices and managing hardware refresh cycles.

    Empower Employees with Access from Anywhere
    Users can access their high-compute/high-GPU workspace, software, and files anytime, anywhere, from any device.

    Radically Minimize Your Attack Surface

    Protect Your Infrastructure, Applications, and Data with Industry-Leading Cloud Security


    Monitor Your Applications

    Monitor the availability, usage, and performance of your software applications, whether hosted or on-premises. Track live metrics streams, events, requests and response times.


    Monitor Your Infrastructure

    Analyze and optimize the performance of your infrastructure, including Virtual Machines (VMs), storage, and databases. Monitor your VMs on a single map.


    Monitor Your Network

    Monitor and diagnose networking issues without logging into your VMs. Trigger a packet capture, analyze network security group flow logs, diagnose routing issues, and gain visibility and control over your network.


    Detect Threats for VMs and Servers

    Monitor and protect your VMs. Get alerts and remediation suggestions from all supported security platforms in an easy-to-use format.


    Detect Fileless Threats

    Identify fileless attack toolkits, techniques, and behaviors.


    Detect Network-based Threats

    Get alerts on suspicious network traffic activity.


    Detect Non-Traditional Attack Techniques

    Analyze memory at the time of a crash to detect attack techniques not easily detected by traditional disk-based approaches.


    Monitor File Integrity

    Validate the integrity of operating system and application software files against a known baseline to identify changes that might indicate an attack.


    Centralize Management through the Dashboard

    Receive alerts when a threat is detected on the resources and services you’re protecting. From the dashboard, you can pivot to perform a detailed investigation to uncover the scope of the attack.


    Gain Insights from Your Data

    Analyze, interact with, and quickly derive insights from huge volumes of operational data in 

    Integrate with Microsoft Defender ATP

    Gain comprehensive Endpoint Detection and Response (EDR) capabilities. Spot abnormalities, detect and respond to advanced attacks on server endpoints.


    Lock Down Inbound Traffic to Your VMs

    Lock down inbound traffic to your Virtual Machines (VMs), reducing exposure to attacks while providing easy access to connect to VMs when needed.


    Protect Your Web Applications

    Protect your web applications from bot attacks and common web vulnerabilities such as SQL injection and cross-site scripting using a Web Application Firewall.


    Provide Secure User Authentication

    Provide hassle-free and secure access to your network, systems, and all applications with Secure Single Sign-on (MFA, X.509, AES), enhanced with Zero Trust & CAuth, reliability, regulatory compliance and workforce flexibility.

    Scan Your Virtual Machine for Vulnerabilities

    Scan your virtual machines for vulnerabilities. The vulnerability scanner included with Security Center is powered by Qualys and widely recognized as the leading tool for identifying vulnerabilities in real time across your VMs. This feature is only available if third-party licenses have been acquired to perform scanning and installation.


    Use Security Rules to Allow or Deny Network Traffic

    Use security rules to allow or deny inbound/outbound network traffic to/from several types of resources.


    Control and Manage Disk Encryption

    Control and manage disk encryption keys and secrets, while ensuring that all data in the VM disks are encrypted at rest in storage.


    Improve Your Incident Median Time to Mitigation

    See and stop threats before they cause harm.  Get a birds-eye view across the enterprise and makes threat detection and response smarter and faster with AI.


    Gain a Graphical View of Your Network (Map)

    Gain recommendations and insights for hardening your network resources from a graphical view with security overlays.


    Assess and Analyze Network Security

    Analyze the security state of your resources for network security best practices. When Security Center identifies potential security vulnerabilities, it creates  recommendations that guide you through the process of configuring the needed controls to harden and protect your resources.


    Harden Your Machines Against Malware

    Control which applications run on your machines to help harden your machines against malware.


    Manage Security Keys

    Easily create and control the keys used to encrypt your data.


    Apply NSGs to Filter Traffic

    Improve your network security posture by applying network security groups (NSG) to filter traffic to and from resources.


    Discover Endpoint Protection Solutions, including:
    • Windows Defender (Microsoft Antimalware)
    • System Center Endpoint Protection (Microsoft Anti-Malware)
    • Trend Micro – all Versions*
    • Symantec v12.1.1100+
    • McAfee v10+ (Windows & Linux*)
    • Sophos V9+ (Linux)*


    Assess Vulnerabilities, including:
    • Missing OS patches assessment
    • Security misconfigurations assessment
    • Disk encryption assessment
    • Third-party vulnerability assessment

    Contact Cloud 9 Advisers immediately to learn more about Desktop as a Service (DaaS), Virtual Desktop Infrastructure (VDI), and Workspace as a Service solutions. We can help you discover if StratusWorx is right for your business. 


    For businesses suffering from COVID-19, StratusWorX is offering non-profits, healthcare providers, and small businesses six months of free remote desktop service, including free Microsoft Office with Microsoft Teams, for up to 10 users.

    “As organizations transition their employees to work from home to mitigate the spread of the coronavirus, our team at StratusWorX is focused on easing the transition by offering our turnkey Cloud Workspace service and our expertise to help organizations securely connect their workers to the applications and data they require to stay productive."
     - Alok Sharma, president and CEO, StratusWorX - 

    Contact Cloud 9 Advisers immediately to learn more about Desktop as a Service (DaaS), Virtual Desktop Infrastructure (VDI), and Workspace as a Service solutions. We can help you discover if StratusWorx is right for your business. 


    For businesses suffering from COVID-19, StratusWorX is offering non-profits, healthcare providers, and small businesses six months of free remote desktop service, including free Microsoft Office with Microsoft Teams, for up to 10 users.

    “As organizations transition their employees to work from home to mitigate the spread of the coronavirus, our team at StratusWorX is focused on easing the transition by offering our turnkey Cloud Workspace service and our expertise to help organizations securely connect their workers to the applications and data they require to stay productive."
     - Alok Sharma, president and CEO, StratusWorX -