Facility Stats
   Web Hosting
   Web Design
   Misc. Web Services
  • inSolSys.com uses four North American points of presence, its main one being a state-of-the-art 80,000 sq. ft. Intelligent Internet Data Center. The center provides the ultimate in security, reliability and technology.
  • A World Class Capital Facility – $75 million has been invested in the Internet Data Center which is housed in an 80,000 sq. ft. (7,432 sq. meter) building, to be expanded to 150,000 sq. ft. (13,935 sq. meters) of hosting solutions floor space, with the capacity of more than 35,000 servers.

  • Clustered Server Environment – inSolSys.com’s Web server clusters are bundles of hardware, operating systems, and applications, integrated to host and serve business-critical web applications to users worldwide. inSolSys.com ensures that the hardware, software and network infrastructure to support websites is robust enough to handle the peaks and valleys of customer demand.

  • Environment – The facility has a strictly controlled dust and pollution free environment. The climate control system maintains a consistent range of between 13-21? C (55-70? F) and humidity at 40 to 60 percent in a static-free facility. The entire facility has raised flooring.

  • Physical Security – The Center provides top-level 24x7x365 perimeter security including video surveillance, biometric and card-key access and 24-hour on-site security.

  • Fire Suppression – The Center has a state-of-the-art smoke detection system with the ability to scan even the smallest (up to 3PPM) particle in the air.

  • Connectivity – The Internet Data Center contains a robust reliable and high quality network. It operates on a SONET ring, diverse redundant fiber-optic network connections with a capacity capable of OC-192 (10 Gigabits) connected by the latest switching and high-speed routing equipment.

  • BGP4 technology - Multiple redundant Internet connections, currently provided by UUNET, LOOK Communications, Telus and Sprint, are implemented through the use of BGP4 (Border Gateway Protocol). This means that not only are the lines redundant (if one carrier's network crashes, traffic is rerouted and your website is still available), but visitors come to the site over the line that will provide the fastest access. We monitor and upgrade bandwidth as needed.

  • Power - All facilities have generator power to protect against localized power outages. Many facilities actually have N+1 generator power which insures the highest levels of uptime. Most facilities also draw power from multiple power grids.

  • Perimeter security via multi-tiered firewalling - inSolSys.com's servers are protected with software-based firewalling. These look at source and destination addresses, and source and destination ports. Security administrators handle all aspects of firewall management. Our engineers are familiar with many types of firewall applications, including CheckPoint, ipchains, ipfw, ipfwadm, etc. We are able to modify response packets with masquerade responses to the remote initiator. Our systems are secured using the latest security methods including router access list filtering on inbound carrier feeds and firewalling at the SYN level on internal devices.

  • Monitoring security systems and processes - All security systems are tested on a monthly basis. We use security scanners such as Nessus, (www.nessus.org), and SAINT, (www.wwdsi.com/saint). Automatic updates are instantly made with the latest exploit/DOS, (Denial of Service), check codes. This provides us with an accurate and detailed report on our systems. Our security team is also subscribed to all the major security mailing lists, including BUGTRAQ from securityfocus.com. These lists provide access to the latest security information, which enables us to patch newly found exploits within hours of their discovery.

  • Intrusion Detection - We currently use a number of intrusion detection applications such as TRIPWIRE, along with our own proprietary monitoring and logging systems. These systems notify our security response team during scans and potential DOS attacks. We react to these situations immediately, modifying ACLs as needed. In certain cases rules are implemented automatically during detection. All suspicious activity is logged hardcopy directly to a printing station which is monitored closely. This ensures there is no tampering with conventional softcopy logs.

  • Anti Virus Measures - Our systems are protected against viruses by extensive built-in access controls. Regular users are unable to access or damage system files.

  • Offsite Backups - Automated offsite secure storage backups to our mirrored storage arrays in the southern US are conducted through secure encrypted tunnels using SSH with confidential data encryption prior to transit.

  • Disaster Recovery Procedure - Our disaster and recovery site is currently located in the South Eastern United States. This site is for the sole purpose of emergency fail over. This NOC is capable of handling all traffic in case our eastern operations is interrupted, however we have taken every precaution necessary to ensure our services will be available under all circumstances. This site is also set up in a redundant, robust, high availability clustered environment. This allows multiple equipment failures with zero degradation in service. All sites are designed and implemented as exact duplicates to ensure the operating environment remains the same. users are unable to access or damage system files.
  Home           About Us           Web Services           Multimedia Services           Support           Contact Us
Copyright 2004, Insolsys.com All rights reserved.