Datacenter Security

ETTE’s datacenter security is comprised of physical and electronic elements, listed below: 

Physical Datacenter Security 

Because of the physical nature of a Datacenter, it is important to have extensive physical security, as well as cybersecurity

ETTE’s Datacenter has the following physical security elements: 

Building perimeter: 

To supplement the property security fence, precast crash-resistant concrete protects the building perimeter. 

Security check–in: 

Visitors entering the building are greeted by a fully-staffed reception desk. At the desk, visitors sign in and out of the building. Our staff provides appropriate (escort or non-escort) badges for each visitor accessing the facility. 

Closed Circuit Television (CCTV): 

CCTV is present throughout the interior of the building and exterior and facility grounds. The CCTV feeds into a protected and hardened control room. Our system records and preserves the feed in the event it is required for later review. 

2 Factor Authentication Factor Access Control: 

Access to and through data center facilities requires a possession factor (card key) and knowledge-based factor (PIN). Visitor card keys expire to prohibit unreturned card use for unauthorized access at a later date. 

Security Staff: 

The ETTE datacenter features an experienced, fully trained security staff protecting the datacenter 24/7. The security staff is responsible for manning building check-in and CCTV control room. Roving security teams patrol the building and grounds. 

Cybersecurity: 

The IT systems at the Datacenter have these defenses, designed to prevent, detect, and respond to a cyber attack. Note that these defenses apply to Datacenter systems and not necessarily individual client systems. Client systems may have stronger or lighter security measures in place: 

Firewall: 

ETTE’s Datacenter has a strong firewall to appropriately test and block questionable network traffic. 

Data Encryption: 

Encrypting data means that even data stolen from a network is unusable without a decryption key. We use encryption for data transfer and storage. 

Advanced Anti-Virus and Anti-Malware protection: 

Advanced systems employ artificial intelligence to predict and stop attacks before they begin. 

Endpoint Protection: 

A cyber defense strategy that focuses on hardening access points to a system’s network, including connectable points like laptops, smartphones, and data ports. 

Intrusion and Detection Protection Systems: 

Monitor applications that seek, assess and respond network anomalies that may be developing attacks. 

Multi-factor Authentication: 

In addition to a password, systems require an additional level of user verification to gain access to the IT environment. 

Real-time Reporting and Auditing: 

System monitors that review the IT environment and issue warnings, alarms, and reports for the network operation. 

Stringent and Enforced Security Policies: 

For example, policies requiring users to change passwords on a regular basis, disabling default security setting, prohibitions against credential sharing, etc.