|
![](../images/line.gif) |
- inSolSys.com uses four North
American points of presence, its main
one being a state-of-the-art 80,000 sq.
ft. Intelligent Internet Data Center.
The center provides the ultimate in
security, reliability and technology.
- A World Class Capital Facility –
$75 million has been invested in the
Internet Data Center which is housed
in an 80,000 sq. ft. (7,432 sq.
meter) building, to be expanded to
150,000 sq. ft. (13,935 sq. meters)
of hosting solutions floor space,
with the capacity of more than
35,000 servers.
- Clustered Server Environment –
inSolSys.com’s Web server clusters
are bundles of hardware, operating
systems, and applications,
integrated to host and serve
business-critical web applications
to users worldwide. inSolSys.com
ensures that the hardware, software
and network infrastructure to
support websites is robust enough to
handle the peaks and valleys of
customer demand.
- Environment – The facility has a
strictly controlled dust and
pollution free environment. The
climate control system maintains a
consistent range of between 13-21? C
(55-70? F) and humidity at 40 to 60
percent in a static-free facility.
The entire facility has raised
flooring.
- Physical Security – The Center
provides top-level 24x7x365
perimeter security including video
surveillance, biometric and card-key
access and 24-hour on-site security.
- Fire Suppression – The Center
has a state-of-the-art smoke
detection system with the ability to
scan even the smallest (up to 3PPM)
particle in the air.
- Connectivity – The Internet Data
Center contains a robust reliable
and high quality network. It
operates on a SONET ring, diverse
redundant fiber-optic network
connections with a capacity capable
of OC-192 (10 Gigabits) connected by
the latest switching and high-speed
routing equipment.
- BGP4 technology - Multiple
redundant Internet connections,
currently provided by UUNET, LOOK
Communications, Telus and Sprint,
are implemented through the use of
BGP4 (Border Gateway Protocol). This
means that not only are the lines
redundant (if one carrier's network
crashes, traffic is rerouted and
your website is still available),
but visitors come to the site over
the line that will provide the
fastest access. We monitor and
upgrade bandwidth as needed.
- Power - All facilities have generator
power to protect against localized
power outages. Many facilities
actually have N+1 generator power
which insures the highest levels of
uptime. Most facilities also draw
power from multiple power grids.
- Perimeter security via
multi-tiered firewalling -
inSolSys.com's servers are protected
with software-based firewalling.
These look at source and destination
addresses, and source and
destination ports. Security
administrators handle all aspects of
firewall management. Our engineers
are familiar with many types of
firewall applications, including
CheckPoint, ipchains, ipfw, ipfwadm,
etc. We are able to modify response
packets with masquerade responses to
the remote initiator. Our systems
are secured using the latest
security methods including router
access list filtering on inbound
carrier feeds and firewalling at the
SYN level on internal devices.
- Monitoring security systems and
processes - All security systems are
tested on a monthly basis. We use
security scanners such as Nessus, (www.nessus.org),
and SAINT, (www.wwdsi.com/saint).
Automatic updates are instantly made
with the latest exploit/DOS, (Denial
of Service), check codes. This
provides us with an accurate and
detailed report on our systems. Our
security team is also subscribed to
all the major security mailing
lists, including BUGTRAQ from
securityfocus.com. These lists
provide access to the latest
security information, which enables
us to patch newly found exploits
within hours of their discovery.
- Intrusion Detection - We
currently use a number of intrusion
detection applications such as
TRIPWIRE, along with our own
proprietary monitoring and logging
systems. These systems notify our
security response team during scans
and potential DOS attacks. We react
to these situations immediately,
modifying ACLs as needed. In certain
cases rules are implemented
automatically during detection. All
suspicious activity is logged
hardcopy directly to a printing
station which is monitored closely.
This ensures there is no tampering
with conventional softcopy logs.
- Anti Virus Measures - Our
systems are protected against
viruses by extensive built-in access
controls. Regular users are unable
to access or damage system files.
- Offsite Backups - Automated
offsite secure storage backups to
our mirrored storage arrays in the
southern US are conducted through
secure encrypted tunnels using SSH
with confidential data encryption
prior to transit.
- Disaster Recovery Procedure -
Our disaster and recovery site is
currently located in the South
Eastern United States. This site is
for the sole purpose of emergency
fail over. This NOC is capable of
handling all traffic in case our
eastern operations is interrupted,
however we have taken every
precaution necessary to ensure our
services will be available under all
circumstances. This site is also set
up in a redundant, robust, high
availability clustered environment.
This allows multiple equipment
failures with zero degradation in
service. All sites are designed and
implemented as exact duplicates to
ensure the operating environment
remains the same. users are unable
to access or damage system files.
|
|
|