ETTE’s datacenter security is comprised of physical and electronic elements, listed below:
Because of the physical nature of a Datacenter, it is important to have extensive physical security, as well as cybersecurity.
ETTE’s Datacenter has the following physical security elements:
To supplement the property security fence, precast crash-resistant concrete protects the building perimeter.
Visitors entering the building are greeted by a fully-staffed reception desk. At the desk, visitors sign in and out of the building. Our staff provides appropriate (escort or non-escort) badges for each visitor accessing the facility.
CCTV is present throughout the interior of the building and exterior and facility grounds. The CCTV feeds into a protected and hardened control room. Our system records and preserves the feed in the event it is required for later review.
Access to and through data center facilities requires a possession factor (card key) and knowledge-based factor (PIN). Visitor card keys expire to prohibit unreturned card use for unauthorized access at a later date.
The ETTE datacenter features an experienced, fully trained security staff protecting the datacenter 24/7. The security staff is responsible for manning building check-in and CCTV control room. Roving security teams patrol the building and grounds.
The IT systems at the Datacenter have these defenses, designed to prevent, detect, and respond to a cyber attack. Note that these defenses apply to Datacenter systems and not necessarily individual client systems. Client systems may have stronger or lighter security measures in place:
ETTE’s Datacenter has a strong firewall to appropriately test and block questionable network traffic.
Encrypting data means that even data stolen from a network is unusable without a decryption key. We use encryption for data transfer and storage.
Advanced systems employ artificial intelligence to predict and stop attacks before they begin.
A cyber defense strategy that focuses on hardening access points to a system’s network, including connectable points like laptops, smartphones, and data ports.
Monitor applications that seek, assess and respond network anomalies that may be developing attacks.
In addition to a password, systems require an additional level of user verification to gain access to the IT environment.
System monitors that review the IT environment and issue warnings, alarms, and reports for the network operation.
For example, policies requiring users to change passwords on a regular basis, disabling default security setting, prohibitions against credential sharing, etc.