Data Center Security Features
Only authorized personnel can gain entry to the data center via finger print scanning technology. Every entry is tracked by the system. In addition, each exterior entrance to the building is monitored 24/7/365 using key fob tracking. The security system is included on the circuits supported by the generator.
Redundant Internet Connectivity
The primary Internet connection is a fiber optic line which is scalable to 10 gigabytes. In order to insure connectivity through completely separate paths, a second (backup) Internet connection is supplied by an independent provider via copper lines. Fail-over is transparent to Client.
Dedicated Climate Control
The data center is cooled by a dedicated, air conditioning and humidity control system that is independent of the office heating and cooling system. The five ton Liebert unit is monitored around the clock and is accessible through a secure website that can be managed remotely. Should any of the multiple sensors detect levels outside set tolerance ranges at least four AtNetPlus staff members are immediately notified.
The backup power supply for the data center is provided by a natural gas powered generator. In the event of a widespread outage AtNetPlus is not reliant on diesel fuel deliveries to maintain uninterrupted power to the data center and security systems. As an extra precaution, the servers in our data center also have UPS backup which handles short-term interruptions as well surge protection.
- Segmentation: Each Client network is completely segmented from all others. Administrative access to the data center is restricted by authorized VPN. Perimeter filtering is applied to reduce traffic impact resulting from outside system attacks.
- Backup: Data is secured with tape rotation and secure storage handled by our staff or by electronic transfer of backup data to an off-site vault. Specific configurations depend on the needs of our client.
- Storage: External redundant storage arrays are used in shared storage scenarios.
- Remote Access: Remote access is handled via secure SSL and VPNs with encrypted traffic. Site to Site VPNs are limited to approved IP ranges.