Comprehensive Datacenter Security Solutions

ETTE’s Datacenter Security Services

ETTE’s datacenter security is comprised of physical and electronic elements, listed below:

Physical Datacenter Security 

Because of the physical nature of a Datacenter, it is important to have extensive physical security, as well as cybersecurity.

ETTE’s Datacenter has the following physical security elements:

Building perimeter:

To supplement the property security fence, precast crash-resistant concrete protects the building perimeter.

Security check–in:

Visitors entering the building are greeted by a fully-staffed reception desk. At the desk, visitors sign in and out of the building. Our staff provides appropriate (escort or non-escort) badges for each visitor accessing the facility.

Closed Circuit Television (CCTV):

CCTV is present throughout the interior of the building and exterior and facility grounds. The CCTV feeds into a protected and hardened control room. Our system records and preserves the feed in the event it is required for later review.

2 Factor Authentication Factor Access Control:

Access to and through data center facilities requires a possession factor (card key) and knowledge-based factor (PIN). Visitor card keys expire to prohibit unreturned card use for unauthorized access at a later date.

Security Staff:

The ETTE datacenter features an experienced, fully trained security staff protecting the datacenter 24/7. The security staff is responsible for manning building check-in and CCTV control room. Roving security teams patrol the building and grounds.

Cybersecurity:

The IT systems at the Datacenter have these defenses, designed to prevent, detect, and respond to a cyber attack. Note that these defenses apply to Datacenter systems and not necessarily individual client systems. Client systems may have stronger or lighter security measures in place:

Firewall:

ETTE’s Datacenter has a strong firewall to appropriately test and block questionable network traffic.

Data Encryption:

Encrypting data means that even data stolen from a network is unusable without a decryption key. We use encryption for data transfer and storage.

Advanced Anti-Virus and Anti-Malware protection:

Advanced systems employ artificial intelligence to predict and stop attacks before they begin.

Endpoint Protection:

A cyber defense strategy that focuses on hardening access points to a system’s network, including connectable points like laptops, smartphones, and data ports.

Intrusion and Detection Protection Systems:

Monitor applications that seek, assess and respond network anomalies that may be developing attacks.

Multi-factor Authentication:

In addition to a password, systems require an additional level of user verification to gain access to the IT environment.

Real-time Reporting and Auditing:

System monitors that review the IT environment and issue warnings, alarms, and reports for the network operation.

Stringent and Enforced Security Policies:

For example, policies requiring users to change passwords on a regular basis, disabling default security setting, prohibitions against credential sharing, etc.