[vc_row full_width=”stretch_row” el_id=”subpage-banner” css=”.vc_custom_1543228170781{background-image: url(https://designingmedia.com/wordpress/hostiko/layout27/wp-content/uploads/2018/11/hero_banner.jpg?id=12) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}”][vc_column css=”.vc_custom_1542709592236{padding-top: 0px !important;}”][vc_row_inner el_id=”hero_banner_inner”][vc_column_inner el_class=”pull-right”][vc_custom_heading text=”Security” font_container=”tag:h2|text_align:center” use_theme_fonts=”yes” el_class=”lato_font font_weight300 color_fff font_size48 line_height54 no_margin”][vc_custom_heading text=”Thoplam’s partner data centers employ a number of unique security protocols and technologies which help our clients comply with the regulatory requirements.” font_container=”tag:p|text_align:center” use_theme_fonts=”yes” el_class=”font_size20 line_height20 opnesans_font font_weight300 color_fff margin_top10 margin_bottom0″][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row full_width=”stretch_row” el_class=”padding_top100 padding_bottom100 background_fff” el_id=”privacy_policyouter”][vc_column css=”.vc_custom_1548659246420{padding-top: 0px !important;}”][vc_custom_heading text=”Physical Controls” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes” el_class=”font_size24 line_height24 margin_bottom35 font_weight700 color_333″][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Physical Controls: The data centers we’ve partnered with are designed to provide mission-critical reliability and continuity of service. Industry leading physical security features, including an armed security presence, and rigid physical controls policies help protect client assets and uninterrupted operations.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Physical Security Controls: Access to the data centers is strictly regulated. All entrances are monitored by security personnel, in addition to two factor access control and utilize alarms for non-standard operations states. Data centers are staffed and patrolled by armed security officers to enhance physical security features and to provide protection for critical services housed within the data centers.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Digital Surveillance: Extensive use of digital security cameras monitor: all building entrance and egress areas, data center access points, all data center floor space where service equipment may be housed, and other areas designated and critical or sensitive.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Fire Suppression: The facilities are protected by industry leading cabinet based fire suppression systems, minimizing the risk of collateral damage from an actual fire or false positive result. This risk mitigating platform provides significant improvements over traditional zone based suppression platforms.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Power & HVAC Systems: Our partner data centers are designed to meet high standards of redundancy. These include critical power and cooling platforms which are provisioned in a fault-tolerant, A+B configuration. Critical power load for each facility is supported by both redundant UPS systems and redundant emergency power generation systems.[/vc_column_text][vc_custom_heading text=”Technical and Logical Controls” font_container=”tag:h3|text_align:left” use_theme_fonts=”yes” el_class=”font_size24 line_height24 margin_bottom35 font_weight700 color_333″][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Network Security: The facilities are protected by industry leading cabinet based fire suppression systems, minimizing the risk of collateral damage from an actual fire or false positive result. This risk mitigating platform provides significant improvements over traditional zone based suppression platforms.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Firewalls: Client data transfers may be made from the client’s environment to our data centers via standard SSH, MPLS or other direct network connection services. Upon request, all non‐required firewall ports can be blocked.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Intrusion Prevention Systems: Enterprise-grade intrusion detection / intrusion prevention systems (IDS/IPS) are utilized to provide early detection of malicious activities. We offer high capasity anti-DDoS services.[/vc_column_text][vc_column_text el_class=”font_size16 line_height24 margin_bottom25 font_weight400″]Network and Security Monitoring: Our platform is managed by distributed systems and security operations teams. System logs, as well as firewall and IDS/IPS event alerts are relayed and escalated 24/7/365 to facilitate early detection of any malicious events.[/vc_column_text][/vc_column][/vc_row]
Build Your Website with HostingStack
From Professional Business To Enterprise, We’ve Got You Covered!
- 551 Swanston Street, Melbourne Victoria 3053 Australia
- info@hostiko.com
- +01-1234-6789
Services
Quick Links
Resources
©2024 Hostiko. All Rights Reserved.