Etisalat Cloud Compute (IaaS) abstracts IT hardware elements into a pool of computing resources and capabilities that are delivered as services i.e. processing , memory , storage and network in an on-demand model with pay-as-you-go and elastic features.


Its goal is to provide a flexible, standard, and virtualized operating environment that eliminates the need to own IT infrastructure.

More Benefits

Highly secure and scalable Cloud Infrastructure:
  • - Faster Time to Market by up to 90%
  • - Easy Commissioning of Services as and when required
  • - Reduced Total Cost of Ownership (TCO) by transforming CAPEX to OPEX (Pay-as-you-go model)
  • - Hosted in a world class Tier III Certified Data Center,
  • - Enhanced agility because IT complexity is managed by the service provider, so companies can focus on their core business
  • - Easy access from any location
  • - Carbon footprint reduction by green IT
  • Service models for Cloud Compute IaaS


    • - In a Public Cloud, the service provider makes the same IT infrastructure available to a number of customers. The computing, storage,networking and other IT resources are shared by many users in a multi-tenant environment.

    • - A Private Cloud provides the customer with the IT infrastructure that they need for their sole use, without sharing it with other customers. This may be a dedicated virtual server, a physical server or a whole data center that is specific to the customer. In this model, the customer can control individual servers and the data flow between them.

    • A Hybrid Cloud combines a private data center, or private cloud service, used for some applications with a public cloud service used for other applications. This approach allows the customer to use a public cloud service in specific situations, e.g., to provide public access to a particular application or to maintain service levels when there is a short-term increase in demand.
  • Multiple layers of security


    • - Infrastructure Level Security - IPS/IDS Firewall, ACLs, 24x7 monitoring and alerts. Security within the infrastructure can be tiered into different levels based on the granularity at which the security services are applied. The security measures include next generation edge firewalls and intrusion prevention and detection systems. Other measures implemented include isolated VLANs and Access Control Lists. The infrastructure is monitored 24x7x365 and alerts are automatically generated by any security event.

    • - Hypervisor Level Security - Data encryption, firewall, host based IPS/IDS (HIPS), anti-malware, web filtering, log inspection, application controls. Security measures at the host level protect systems and applications deployed in private, public, and hybrid clouds using anti-malware, web filtering, integrity monitoring, intrusion detection and prevention, firewall, and log inspection modules. Combining device control, encryption and key management with contextual awareness secures data across physical, virtual and cloud environments.

New Customer

Existing Customer