What is remote hosting?
Remote hosting is a method by which software applications, databases, and files are housed on servers in data centers rather than directly on users’ PCs or laptops. When a user wishes to run an application or access files, they securely log in to the remote server via the Cloud, and then access their software or data.
The built-in centralization of hosted applications allow IT departments to add and authorize users, update each application, back up and restore data, and deploy data directly to the departments and users who specifically require it. And by accessing software through thin clients or tablets, users’ devices rarely crash or become corrupted.
Hosted solutions also enable levels of security often not found with traditional IT systems. By physically storing and maintaining software and data in offsite data centers, businesses can minimize the risks (i.e., loss, theft, and natural disasters) inherent in storing data on traditional devices such as desktops and local servers.
A business may choose to house one or more business applications on a data center server hosted in the Cloud. To access the applications, users choose their device (e.g., thin client, laptop, tablet), and then log in to the Cloud from anywhere on the Internet. Once logged in, the user sees their application just as they would with a desktop PC.
Microsoft® Exchange is a server-based system that delivers email services between users via PC, smart phone, tablet, or other devices. With Hosted Exchange, a business’ Exchange server is hosted and managed in the Cloud, and delivers email, calendars, and contacts to users’ thin clients, laptops, or mobile devices via the Internet.
Hosted desktop (aka remote desktop) solutions allow users to access their productivity software and documents via the Cloud. A user chooses their device (e.g., thin client, laptop, tablet), and then securely logs in to the Cloud from anywhere on the Internet. Once logged in, the user sees their Microsoft Windows® desktop, software, and files, just as they would with a desktop PC. Whether in the office on a laptop or at home on a tablet, the user’s entire desktop is always available and always secure.