Security

Thoplam's partner data centers employ a number of unique security protocols and technologies which help our clients comply with the regulatory requirements.

Physical Controls

Physical Controls: The data centers we’ve partnered with are designed to provide mission-critical reliability and continuity of service. Industry leading physical security features, including an armed security presence, and rigid physical controls policies help protect client assets and uninterrupted operations.

Physical Security Controls: Access to the data centers is strictly regulated. All entrances are monitored by security personnel, in addition to two factor access control and utilize alarms for non-standard operations states. Data centers are staffed and patrolled by armed security officers to enhance physical security features and to provide protection for critical services housed within the data centers.

Digital Surveillance: Extensive use of digital security cameras monitor: all building entrance and egress areas, data center access points, all data center floor space where service equipment may be housed, and other areas designated and critical or sensitive.

Fire Suppression: The facilities are protected by industry leading cabinet based fire suppression systems, minimizing the risk of collateral damage from an actual fire or false positive result. This risk mitigating platform provides significant improvements over traditional zone based suppression platforms.

Power & HVAC Systems: Our partner data centers are designed to meet high standards of redundancy. These include critical power and cooling platforms which are provisioned in a fault-tolerant, A+B configuration. Critical power load for each facility is supported by both redundant UPS systems and redundant emergency power generation systems.

Technical and Logical Controls

Network Security: The facilities are protected by industry leading cabinet based fire suppression systems, minimizing the risk of collateral damage from an actual fire or false positive result. This risk mitigating platform provides significant improvements over traditional zone based suppression platforms.

Firewalls: Client data transfers may be made from the client’s environment to our data centers via standard SSH, MPLS or other direct network connection services. Upon request, all non‐required firewall ports can be blocked.

Intrusion Prevention Systems: Enterprise-grade intrusion detection / intrusion prevention systems (IDS/IPS) are utilized to provide early detection of malicious activities. We offer high capasity anti-DDoS services.

Network and Security Monitoring: Our platform is managed by distributed systems and security operations teams. System logs, as well as firewall and IDS/IPS event alerts are relayed and escalated 24/7/365 to facilitate early detection of any malicious events.