Engineered to the standards required to support the Zero-Downtime Network...


Only authorized data center personnel are granted access credentials to our data centers. No one else can enter the production area of the datacenter without prior clearance and an appropriate escort. 3 Tier Security
Keycard protocols, biometric scanning protocols and round-the-clock interior and exterior surveillance monitor access to every one of our data centers.
Security camera monitoring at all data centre locations
24x7 onsite staff provides additional protection against unauthorized entry
Unmarked facilities to help maintain low profile
Physical security audited by an independent firm
Every data center's HVAC (Heating Ventilation Air Conditioning) system is N+1 redundant. This ensures that a duplicate system immediately comes online should there be an HVAC system failure.
Every 90 seconds, all the air in our data centers are circulated and filtered to remove dust and contaminants.
Should a total utility power outage ever occur, all of our data centers' power systems are designed to run uninterrupted, with every server receiving conditioned UPS (Uninterruptible Power Supply) power.

Protecting the integrity of your data and guarding against service interruptions...


System installation using hardened, patched OS 3 Tier Security
System patching configured to provide ongoing protection from exploits
Dedicated firewall and VPN services to help block unauthorized system access
Data protection with managed backup solutions.
Optional, dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access
Distributed Denial of Service (DDoS) mitigation services based on PrevenTierô system.
Risk assessment and security consultations carried out regularly by professional services teams from Rackspace
   

Without exception we take data security seriously...


All employees trained on documented information security and privacy procedures
3 Tier Security
Access to confidential information restricted to authorized personnel only, according to documented processes
Systems access logged and tracked for auditing purposes
Secure document-destruction policies for all sensitive information
Fully documented change-management procedures
Secure Socket Layers (SSL) encrypts all transmitted data
All passwords encrypted during transmission using one way Blowfish encryption 256bit
Dedicated Cisco firewall restricts access to your permitted networks (generally by NAT)
Secure media handling and destruction procedures for all customer data
Support-ticket history available for review.

Independently audited disaster recovery and business continuity plans in place.
nISO17799-based policies and procedures, regularly reviewed as part of our SAS70 Type II audit process
Full system audit trail stored as part of client system and attached at record level.