Data Centres & Infrastructure

Modern, robust, secure and flexible operating infrastructures are a key factor in ensuring stable operations and maintaining the innovative power of companies. RISE provides the infrastructure and highly efficient processes with a team of experts to run critical applications with high availability and the appropriate level of protection.

Our data centres

RISE operates several data centre locations in Austria and Germany and is therefore compliant with BSI redundancy for critical infrastructure. Some locations are certified according to TÜViT TSI Level 4 and DIN EN50600 and thus meet the highest security standards. The sites are connected redundantly and the sites are equipped with BSI and GDPR-compliant DDoS protection.

RISE-data centre locations in Austria and Germany

Information security is not just important - it is essential. RISE relies on a certified IMS in accordance with ISO/IEC 27001, ISO/IEC 27701 and ISO/IEC 9001.

With regular internal and external audits and effectiveness checks, we live a closed and tight-knit cycle for continuous improvement of our management systems and operating processes - from ISMS to DSMS and QMS to IMS.

Keep track of your services

RISE operates a state of the art logging and monitoring infrastructure for services in the RISE data centre. All log entries from all layers (infrastructure, platform and application) are collected and processed across all sites in a centralised and multi-tenant logging system. We achieve our high quality of service by automatically consolidating and aggregating events to optimise operational support. Proactive response to impending problems, automatic alerting in the event of technical faults and target oriented visualisation of complex system statuses for a quick overview are a matter of course.

RISE relies on observability as a means to more reliable software development and operation.

Security end-to-end

As a security service provider, RISE also offers a comprehensive security portfolio from a single source, throughout the implementation process and into ongoing operations.

Our customers benefit from standardised processes and tools that serve as the basis for different operating environments within high-security systems, including solutions for the telematics infrastructure in the German healthcare system. Our offering includes components and libraries, solutions for operational security, tools for testing security aspects as part of test automation and penetration testing. RISE solutions are implemented in certified environments, tested to high security standards and secured with appropriate processes. Many of our solutions are also assessed by independent external testing bodies to ensure their security and reliability. RISE's extensive expertise gives your projects the necessary security edge!

RISE solutions are implemented in certified environments in accordance with high security standards.
Selected topics

Virtualisation, databases and storage

Choose from our range of infrastructure and platform services. You can buy entire Kubernetes-based virtualisation environments from RISE - or start with a namespace on our shared infrastructure.

Dashboards and management overview

To maintain an overview of large infrastructures and enable efficient root cause analysis (RCA), visualisation tailored to the needs of different user groups is essential.

SIEM integration

Security Information and Event Management (SIEM) provides a holistic view of the security of your IT systems, enabling you to detect security breaches and proactively search for potential threats.

Online monitoring of metrics

Whether it is a CPU usage, a memory volume or the number of application calls and their execution times, all these values need to be collected and stored before they can be used for alerting and trend analysis.

Trend analysis and capacity utilisation forecasts

Today, capacity management is more important than ever. Avoiding downtime and meeting SLAs is a key operational objective.

End-to-end checks

The monitoring system gives a green light - but customers and end users still report problems with response times or availability? Monitoring is only as good as its relation to service performance as perceived by the service user.

Integration of service providers and external services

Modern IT systems are highly dependent on externally provided services. Just as internal applications depend on internal services such as databases and storage systems to function, applications or internal systems now depend on external services.

Virtualisation, databases and storage

Choose from our range of infrastructure and platform services. You can buy entire Kubernetes-based virtualisation environments from RISE - or start with a namespace on our shared infrastructure.

Our infrastructure offering scales as your business grows, but we recognise the value of flexibility in both technology and staffing. Do your database experts want to create and manage databases on their own? No problem with our infrastructure. If you want to leverage the expertise of our database experts and leave the setup and administration to us, choose a database offering from our portfolio.

Want to create and manage your own databases? No problem!

Dashboards and management overview

To maintain an overview of large infrastructures and enable efficient root cause analysis (RCA), visualisation tailored to the needs of different user groups is essential.

Fast online problem analysis - no manually generated reports We provide the ability to resolve problems faster and more accurately than ever before, with easy drill-down to the root cause of millions of recorded log entries. Accurate monitoring of IT services at the points that matter for meeting SLAs - not just availability SLAs, but also performance SLAs.

With AIOps, we can continuously detect increasing response times before your users notice them. Easy, fast analysis and reporting with meaningful results.

RISE attaches great importance to a common information base for all user groups. As different as dashboards can be, modern infrastructure, network, system and application monitoring must have a common technical database - a single-point-of-truth. Only with a common database is it possible to drill down across technologies, teams and departments, from alarm messages and performance metrics to individual relevant protocol lines.

SIEM integration

Security Information and Event Management (SIEM) provides a holistic view of the security of your IT systems, enabling you to detect security breaches and proactively search for potential threats.

SIEM and operations are inextricably linked in today's IT environments - an IT outage may be caused by a security incident, and an identified security problem may increase the risk of future outages. As with the technical monitoring of an IT environment, SIEM data accumulates in many different places, and only by collecting this data in a central location is it possible to efficiently identify trends and patterns that deviate from the usual pattern.

Overview and flexibility for high efficiency in hazard control.

RISE integrates the SIEM with a protocol monitoring system that is already in use for application and infrastructure monitoring. By using predefined anomaly detection mechanisms, incorporating publicly available detection rules based on the MITRE ATT&CK® framework, as well as powerful investigation capabilities and integrated case management, we significantly accelerate the fight against threats. The standardised availability of all functionalities in a single, modern interface enables RISE security experts in the RISE SOC to maintain an overview and react quickly to changing conditions.

Online monitoring of metrics

Whether it is a CPU usage, a memory volume or the number of application calls and their execution times, all these values need to be collected and stored before they can be used for alerting and trend analysis.

RISE monitors thousands of components with tens of thousands of metrics and more. Whether the metrics are collected via SNMP, WMI, log files or application specific logs, we unify all metrics in a common database and integrate them into various dashboards - including configured thresholds that automatically notify service management via pre-defined mechanisms when they are reached.

Trend analysis and capacity utilisation forecasts

Today, capacity management is more important than ever. Avoiding downtime and meeting SLAs is a key operational objective.

Well-established capacity management with a valid database allows RISE to scale efficiently before negative effects on IT services become apparent. Supported by statistical and AI methods, RISE monitoring systems can identify potentially critical developments.

RISE's operational experts are experienced in time series analysis and the selection of appropriate methods - from the consideration of seasonal variations to the selection and configuration of statistical methods and the targeted use of artificial intelligence methods.

End-to-end checks

The monitoring system gives a green light - but customers and end users still report problems with response times or availability? Monitoring is only as good as its relation to service performance as perceived by the service user.

The correct choice of the point through which a service is monitored (the service access point) and the point from which the service is monitored (the service monitoring point) is essential.

To avoid seeing green when a service user sees red.

In RISE monitoring, the Service Access Point is always identical to the IP address and URL used by the end user. We prefer to have the service monitoring point directly on the end user's device - if this is not possible, we select a service monitoring point as close to the end user as possible to cover as many components and network paths as possible in one measurement. Our end-to-end checks go as far as running specialised use cases that perform a representative set of application functionalities as part of our regular measurements - to avoid seeing green when a service user sees red.

Integration of service providers and external services

Modern IT systems are highly dependent on externally provided services. Just as internal applications depend on internal services such as databases and storage systems to function, applications or internal systems now depend on external services.

There is no reason for us not to integrate these external systems into our service monitoring, just as we do for internal services. A single point of truth does not show the whole truth if we do not monitor essential components - even if they are provided externally.

Security

Operation with passion

Just as a microservices architecture is more than the sum of its parts, a robust data centre operation is more than the sum of its technologies and processes. We combine technical expertise, research innovation, deep industry knowledge and passion to deliver stable and high performance services to our customers. We are well versed in a wide range of technologies across all operational areas and are happy to solve complex problems for you - even where others might shy away.

Find out more