Physical Controls: Thoplam data centers are specifically designed to provide mission-critical reliability and continuity of service. Industry leading physical security features, including an armed security presence, and rigid physical controls policies help protect client assets and uninterrupted operations.
Physical Security Controls: Access to our data centers is strictly regulated. All entrances are monitored by security personnel, in addition to two factor access control and utilize alarms for non-standard operations states. Data centers are staffed and patrolled by armed security officers to enhance physical security features and to provide protection for critical services housed within the data centers.
Digital Surveillance: Extensive use of digital security cameras monitor: all building entrance and egress areas, data center access points, all data center floor space where service equipment may be housed, and other areas designated and critical or sensitive.
Fire Suppression: Our facilities are protected by industry leading cabinet based fire suppression systems, minimizing the risk of collateral damage from an actual fire or false positive result. This risk mitigating platform provides significant improvements over traditional zone based suppression platforms.
Power & HVAC Systems: Our data centers are designed to meet high standards of redundancy. These include critical power and cooling platforms which are provisioned in a fault-tolerant, A+B configuration. Critical power load for each facility is supported by both redundant UPS systems and redundant emergency power generation systems.
Network Security: Our facilities are protected by industry leading cabinet based fire suppression systems, minimizing the risk of collateral damage from an actual fire or false positive result. This risk mitigating platform provides significant improvements over traditional zone based suppression platforms.
Systems Security: Access services and platforms supporting the Thoplam platform are strictly monitored. Servers and platforms are selected and configured to maximize their reliability and security, and are configured to prevent intrusions and protect against day‐to‐day threats.
Firewalls: Client data transfers may be made from the client’s environment to our data centers via standard SSH, MPLS or other direct network connection services. Upon request, all non‐required firewall ports can be blocked.
Intrusion Prevention Systems: We utilize enterprise-grade intrusion detection / intrusion prevention systems (IDS/IPS) to provide early detection of malicious activities. We offer high capasity anti-DDoS services.
Network and Security Monitoring: Our critical service platforms are managed by our distributed systems and security operations teams. System logs, as well as firewall and IDS/IPS event alerts are relayed and escalated 24/7/365 to facilitate early detection of any malicious events.