Security & Datacenters 2018-04-04T11:16:17+00:00

SECURITY & DATACENTERS

Advanced & Proven Hosting Infrastructure

SECURITY & DATACENTERS

Advanced & Proven Hosting Infrastructure

We have pioneered the concept of a Globally distributed Datacenter. Our Datacenter is a globally distributed collection of redundant server infrastructure which hosts all our Products and Services.

Salient features of our Datacenter

  • Integrates hundreds of distributed servers seamlessly
  • Provides high-availability, redundancy and unmatched reliability

OUR DATACENTER DETAILS

Scalability & Reliability
Our Datacenter consists of a complex mesh of global servers that interact with each other. The entire architecture is built upon common principles of High-Availability, Clustering and n+1 Architecture. This allows us to scale our solutions to match your exponential growth by simply adding infrastructure and linking it to this architecture. You are abstracted from worrying about variables such as scalability, uptime, network response etc

Global Reach
We and our partners have invested in infrastructure deployments at various locations globally. You can now leverage upon this global infrastructure and offer a completely private-labeled global experience to your Customers without any investments. We handle the selection, negotiation and relationship management with Infrastructure providers around the world.

White Labeled Architecture
Our Datacenter is a cluster of globally distributed redundant servers of various different operating systems to provide your Customers and Resellers with myriad hosting options. The servers, and IP addresses are white-labeled and cannot be traced back to us. If you are one of our Resellers, then the name servers used for any services hosted on these servers would be your branded Name Servers. So for all practical purposes these clusters of hundreds of servers would appear as YOUR servers to your Customers.

WHY OUR DATACENTER?

Our Datacenter consists of servers distributed across various Datacenters worldwide. Most of these datacenters have certain common qualifications described below –

Network
The datacenters are connected to the internet through Gigabit ethernet connections from separate backbone providers, who each run fiber optic cables into the data center through separate entry points.

Security
To guard against line failure or intrusion, the data center is staffed 24 hours a day. Movement throughout the facility is escorted at ALL times. There is 24×7 closed circuit monitoring of all areas and entrances. Between the cameras, access control, and the security team, the datacenter facilities are pretty secure.

Power
The total incoming power is a multiple of what is required to run the datacenter. There is an ATS (Automatic Transfer switch) in place to automatically kick in a generator in case of a power failure. The datacenters are also equipped with redundant UPS systems to ensure clean power.

Cooling
Redundant A/C systems, each running at a fraction of their capacity, keep the server rooms cool. The units are alternated so that each one is kept in optimal condition.

Advanced Smoke Detection & Fire Protection Systems
The datacenters are equipped with specialized fire detection and protection systems meant specifically for protecting servers as using ordinary water based systems would cause just as much damage as fire.

In order to reduce security risks to minimum, a holistic approach to security is required. Our security processes are born out of a clear definition of the threats to our system.

SECURITY GOALS

Privacy – Information within our infrastructure and systems will only be accessible by authorized users

Integrity – Data and information within our infrastructure cannot be tampered with by any unauthorized user

Data Protection – Data within the systems cannot be harmed, deleted or destroyed

Identification and Authentication – Ensures that any user of the system is who he claims to be and eliminates chances of impersonation

Network Service Protection – Ensures that networking equipment is protected from malicious hacking attempts or attacks that threaten uptime

Why our Datacenter?

Our Datacenter consists of servers distributed across various Datacenters worldwide. Most of these datacenters have certain common qualifications described below –

Network
The datacenters are connected to the internet through Gigabit ethernet connections from separate backbone providers, who each run fiber optic cables into the data center through separate entry points.

Security
To guard against line failure or intrusion, the data center is staffed 24 hours a day. Movement throughout the facility is escorted at ALL times. There is 24×7 closed circuit monitoring of all areas and entrances. Between the cameras, access control, and the security team, the datacenter facilities are pretty secure.

Power
The total incoming power is a multiple of what is required to run the datacenter. There is an ATS (Automatic Transfer switch) in place to automatically kick in a generator in case of a power failure. The datacenters are also equipped with redundant UPS systems to ensure clean power.

Cooling
Redundant A/C systems, each running at a fraction of their capacity, keep the server rooms cool. The units are alternated so that each one is kept in optimal condition.

Advanced Smoke Detection & Fire Protection Systems
The datacenters are equipped with specialized fire detection and protection systems meant specifically for protecting servers as using ordinary water based systems would cause just as much damage as fire.

FEATURES / 24 X 7 SERVER MONITORING

Enterprise-grade 24×7 Server Monitoring and Network Security

Our infrastructure comprises of high availability clusters of different machines, with varied operating systems and applications, spread across multiple continents. Click here to read more about the our Virtual Datacenter

An effective monitoring system is extremely crucial for ensuring maximum uptime. Today, any web services company manages hundreds of servers with a large number of services running on each server. Manually checking each service on just one server 24 x 7 is extremely difficult – across a number of servers – is humanly impossible.

Companies that do not have a good monitoring system, or worse, don’t have one at all, have larger downtimes and are increasing the risk of potential damage caused due to service disruptions. An undetected minor issue can change into a major issue rapidly, increasing the amount of damage caused.

Our monitoring systems and tools provide our system administrators with an all-encompassing view into the health of our globally distributed infrastructure. We monitor a large number of parameters related to the health of our servers and individual services that reside on them.

Services monitored include –

  • Network Connectivity
  • Server Disk Space
  • Server CPU Usage
  • Server Memory Usage
  • Web Services – HTTP, HTTPS & FTP
  • Email Services – SMTP, POP & IMAP
  • Database Services – MySQL, MSSQL
  • DNS Services
  • All Log Files

and More…

If any server or service fails, or any resource utilization exceeds specified limits, then a notification pops-up immediately on the screen of all our Infrastructure Monitoring Staff. The notification system also handles escalation of issues i.e. if the issue is not resolved within ‘x’ minutes, SMS alerts are sent out to higher level system administrators, and subsequently to Management.

All of this allows us to detect and resolve any issue within minutes of it happening and ensures maximum uptime for your customers.

FEATURES / DATA PROTECTION & DISASTER RECOVERY PLANS

Advance Data Protection and Disaster recovery services with Website Hosting Services

We understand that data is the lifeblood of most companies today and organizations increasingly require 100% uptime, where data is constantly online and accessible. We have therefore implemented solid solutions that allows you to protect your data in the unfortunate event of software malfunction, system failure, events of loss of data due to hacking or viruses etc.

RAID Technology – We use cutting-edge RAID Hardware to protect all data on the server against harddisk failures. This technology works by creating a mirror of all data on more than one harddisk automatically, without any delay i.e. all data is written to multiple harddisks simultanously so that if any harddisk fails, that harddisk will be marked as deactivated and the system will still continue to function as though nothing has happened by using the copy of the data on the other harddisk(s). The best part is that you do not require to make any changes or special code modifications in your website/web application for this technolgy to function.

RAID systems offer a significant advantage over non-RAID systems, both in terms of data protection and ability to maintain 100% uptime, as the system continues to function perfectly in case of disk failures. RAID technology also marginally improves the performance of the various services on the server.

As soon as a harddisk fails, notification alerts are sent out, so that the failed harddisk can be replaced by the system administrators. As such, the system continues to perform normally despite disk failures, using the mirror of the data on the additional harddisk(s).

Daily & Weekly Server Backups – Important data exists across various locations on a server. Our subject-matter experts have conducted comprehensive research and have prepared complex backup scripts that automatically maintain copies of all important files and folders, in a secure manner, on a regular pre-defined interval, such that we can restore a server in the shortest possible time, in the event of a total failure.

Your Own Backup Policy Manager (Only Applicable for Web Hosting Packages) – All our services involve your crtitical data. Most of our Products have a built-in Backup Manager that provides comprehensive and cost effective protection by allowing you to define highly flexible backup policies that will protect your critical data. A web-based backup policy manager provides an easy-to-use one-step wizard to define the backup scope, backup frequency and backlogs