ETTE’s datacenter security is comprised of physical and electronic elements, listed below:
Physical Datacenter Security
Because of the physical nature of a Datacenter, it is important to have extensive physical security, as well as cybersecurity.
ETTE’s Datacenter has the following physical security elements:
To supplement the property security fence, precast crash-resistant concrete protects the building perimeter.
Visitors entering the building are greeted by a fully-staffed reception desk. At the desk, visitors sign in and out of the building. Our staff provides appropriate (escort or non-escort) badges for each visitor accessing the facility.
Closed Circuit Television (CCTV):
CCTV is present throughout the interior of the building and exterior and facility grounds. The CCTV feeds into a protected and hardened control room. Our system records and preserves the feed in the event it is required for later review.
2 Factor Authentication Factor Access Control:
Access to and through data center facilities requires a possession factor (card key) and knowledge-based factor (PIN). Visitor card keys expire to prohibit unreturned card use for unauthorized access at a later date.
The ETTE datacenter features an experienced, fully trained security staff protecting the datacenter 24/7. The security staff is responsible for manning building check-in and CCTV control room. Roving security teams patrol the building and grounds.
The IT systems at the Datacenter have these defenses, designed to prevent, detect, and respond to a cyber attack. Note that these defenses apply to Datacenter systems and not necessarily individual client systems. Client systems may have stronger or lighter security measures in place:
ETTE’s Datacenter has a strong firewall to appropriately test and block questionable network traffic.
Encrypting data means that even data stolen from a network is unusable without a decryption key. We use encryption for data transfer and storage.
Advanced Anti-Virus and Anti-Malware protection:
Advanced systems employ artificial intelligence to predict and stop attacks before they begin.
A cyber defense strategy that focuses on hardening access points to a system’s network, including connectable points like laptops, smartphones, and data ports.
Intrusion and Detection Protection Systems:
Monitor applications that seek, assess and respond network anomalies that may be developing attacks.
In addition to a password, systems require an additional level of user verification to gain access to the IT environment.
Real-time Reporting and Auditing:
System monitors that review the IT environment and issue warnings, alarms, and reports for the network operation.
Stringent and Enforced Security Policies:
For example, policies requiring users to change passwords on a regular basis, disabling default security setting, prohibitions against credential sharing, etc.