Data Center Security 100% UPTIME PUZZLE. Page 1
|
|
|
- Meghan Hardy
- 10 years ago
- Views:
Transcription
1 Page 1 Why we build Data Centre The data center is the heart of any Organization Data Centre Security Data center is a term used to describe the physical hosting of computer equipment in a shared data center environment that is mutually beneficial to various tenants without each incurring the full cost of designing, building, and maintaining the environment. Campus data center is designed to function as a hardware facility for the purpose of housing computing systems providing various mission-critical services to the campus. What is it that makes a Data Center? POWER COOLING SECURITY FIRE There are four levels of security for physical access to securely hosted servers and equipment in data center. The first level is code access to the building. Everyone will need a private code or someone with a code to assist you to get into the building. 100% UPTIME PUZZLE The second level is biometric access to the floor. employees or data center visitors will need to pass a biometric Palm scanner to gain access to Data Center.
2 Page 2 The third level is the card reader access to the server area. All access information such who and when gained access to the server area are logged. Security manager can review such access information at anytime. The fourth level is locked cabinets for securely hosted servers. Keys are required to open such locked cabinets. In addition to four level physical access control, the data center is also monitored by security cameras. Fire Detection & Suppression Fire Detection & Suppression Supply, Testing and Commissioning of Kidde Fire Protection System or Approved Equal include optical / ionization smoke detectors and rate of rise heat detectors located within floors / ceilings and room space & Area below raised floor. Hi Fog fire suppression systems in some of the larger data centers. zoned fire alarm panel break glass units, sounders and alarm bells. FM200 extinguishing systems in both large data centers and small computer rooms optical / ionisation smoke detectors Gas going out valve
3 Page 3 Data Center: Computer Room Power Ensuring the availability of critical data centre, power is at the top of a designers list. IT equipment must be supplied with a clean, consistent source of electrical power, which allows the equipment to avoid system errors and / or a system crash. The following systems are available in a Data centre: Power conditioning and UPS (interruptible Power Supply) systems. Standby diesel generator systems. Mains switchgear. General distribution and lighting. Data Center: Room Air Conditioning power and environmental control / cooling are inseparable design criteria to achieve cost effective and reliable solutions, by using the following systems : Air conditioning - close control and comfort. ventilation and extract systems. Water detection systems - local and perimeter sensing. Data Center: Room Build MDF: Main Distribution Facility : Intermediate Distribution Facility Raised floor (for cabling) OF MDF Control Room Secure environment Data Centre
4 Data Centre Architecture Data centre bandwidth: Gigabit and 10 Giga Ethernet 1000BASE-TX 1000BASE-SX 1000BASE SX 1000BASE-LX Gigabit Ethernet IEEE 802.3z Data Center Servers Configuration Design Data Center Network Servers Design MS Exchange Cluster MS SQL Cluster Internal Web Server Public Web Server SQL FrontEnd Server Datbase VLAN Main Network Users Workstation Exchange Front -End Server Domain Controller Servers 2Gb/s Fiber Channel 16 Ports Switches 2x 2Gbit Fiber Connections for Storage SAN to different Fiber Channel Switches for Load Balancing and Failover ISA Firewall and Caching Server Anti-virus Server Test Server SAN Storage SMS Server Backup Server Tap Library Store Edge L500 LTO 2 Storage SAN Fiber Connect GE (1000Mb/s) connection FE (100Mb/s) connection SCSI connection 2x CPUs, 8GB Memory 4x CPUs, 12GB Memory With Windows 2003 OS With Windows 2003 OS Page 4 Network Services Application Services Visualization Services Storage services
5 Page 5 Data Center Secure Connections Data Center network security are customized to each customer's needs. It can be a combination of : firewall on network routers and switches, dedicated network firewalls and checkpoints such as Netscreen, Cisco Pix, Watchguard firewalls, Firewall and antivirus Software on each server. Data transfers can be secured by VPN, SSL, and SSH Security Between Networks Router Router Windows 2000-based Server/Router Windows 2000-based Server/Router
Powerful Dedicated Servers
Powerful Dedicated Servers Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled server specification,
out of this world guide to: POWERFUL DEDICATED SERVERS
out of this world guide to: POWERFUL DEDICATED SERVERS Our dedicated servers offer outstanding performance for even the most demanding of websites with the latest Intel & Dell technology combining unparalleled
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100
112 Linton House 164-180 Union Street London SE1 0LH T: 020 7960 5111 F: 020 7960 5100 Our dedicated servers offer outstanding performance for even the most demanding of websites with the low monthly fee.
Frankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
hong kong//china data center specifications tel: +61 2 9948 8888 fax: +61 2 9948 1111 internet + intellectual property + intelligence
internet + intellectual property + intelligence We thank you for the opportunity to work with you regarding your colocation needs in Hong Kong, China. We can colocate standard rack-mountable servers or
Data Center Infrastructure & Managed Services Outline
Data Center Infrastructure & Managed Services Outline The 360 Technology Center Solutions Data Center is located in Lombard, IL, USA. We are 20 minutes outside of downtown Chicago. The 360TCS staff consists
Tk20 Network Infrastructure
Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...
Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive
Co-Location Services Safeguard your critical IT assets in a highly secure, fully redundant, environmentally-conditioned and constantly monitored hosting space to receive optimum performance 24x7. SERVICE
Cisco Network Switches Juniper Firewall Clusters
Cisco Network Switches Juniper Firewall Clusters Cisco Network Infrastructure Cisco Network Infrastructure Core Network Consists of 4 Cisco 4506 switches 10 Gig E Fiber Optic Connections between switches
DATA CENTRE DATA CENTRE MAY 2015
DATA CENTRE DATA CENTRE MAY 2015 CONCERTHOUSE MUSIC Concerthouse Music Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level
Security & Infrastructure White Paper
Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519
Hardware/Software Deployment Strategies. Introduction to Information System Components. Chapter 1 Part 4 of 4 CA M S Mehta, FCA
Hardware/Software Deployment Strategies Introduction to Information System Components Chapter 1 Part 4 of 4 CA M S Mehta, FCA 1 Hardware/Software Deployment Strategies Learning Objectives Task Statements
MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview
MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide
Network Router Monitoring & Management Services
Network Router Monitoring & Management Services Get different parameters of routers monitored and managed, and protect your business from planned and unplanned downtime. SERVICE DEFINITION: NETWORK ROUTER
Data Center Presentation
Data Center Presentation The NetSource Datacenter. Agenda General Layout of Data Center Policies and Procedures Designed to Latest Standards High Performance High Reliability High Security Design Details
Our Hosting Infrastructure. An introduction to our Platform, Data Centres and Data Security. www.in-tuition.net
Our Hosting Infrastructure An introduction to our Platform, Data Centres and Data Security www.in-tuition.net UK Infrastructure Infrastructure Overview Intuition Networks has provided managed Internet
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS
CONSTRUCTION / SERVICE BILLING SYSTEM SPECIFICATIONS Jonas Software, March 2013 Contents Introduction... 3 Hardware Specifications... 4 Recommended Server Hardware Specifications... 4 Recommended Workstation
DATA CENTRE DATA CENTRE
DATA CENTRE DATA CENTRE v. OCT 2014 DJ CENTRAL DJ Central Data Centre services are located in the Equinix Internet Business Exchange (IBX ) Centre at Mascot. This IBX offers the highest level of service
Antelope Enterprise. Electronic Documents Management System and Workflow Engine
Antelope Enterprise Electronic Documents Management System and Workflow Engine Antelope Enterprise v4 High Availability Edition Information in this document applies to the Antelope Enterprise v4 High Availability.
Restricted Document. Pulsant Technical Specification
Pulsant Technical Specification Title Pulsant Government Virtual Server IL2 Department Cloud Services Contributors RR Classification Restricted Version 1.0 Overview Pulsant offer two products based on
How To Write An Infrastructural Standard For Data Center Infrastructure
Infrastructure Standard for Data Centers ANSI/CSA/EIA/TIA-942 (PN-3-0092) Introduction When approved, the standard will be: ANSI/CSA/EIA/TIA-942 Telecommunications Infrastructure Standard for Data Centers
GTS Software Remote Desktop Services
GTS Software Remote Desktop Services RemoteApp client requirements and hosting environment details CONTENTS Introduction... 2 Client requirements... 2 RD Web Access... 2 Distributed RDP or MSI packages...
Expert Reference Series of White Papers. Planning for the Redeployment of Technical Personnel in the Modern Data Center
Expert Reference Series of White Papers Planning for the Redeployment of Technical Personnel in the Modern Data Center [email protected] www.globalknowledge.net Planning for the Redeployment of
VPS Cloud Hosting. Call (02) 9934 0594
Hosting With a clustered hosting platform, auto-failover network, built on IBM Blade servers and completely managed by VMware - Netregistry s hosting is a great solution for resellers, creative agencies
Colocation. Scalable Solutions for Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for Shared IT Infrastructure Global competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building their own
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Appendix 3. Specifications for e-portal
Appendix 3. Specifications for e-portal 1. e-portal H/W and S/W No Equipment Specification Unit Q'ty 1 Web Server for users and administrator 2 WAS Server 3 LMS Server 4 DB Server 4U Rack Type 8 Core Intel
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
Patriot Hardware and Systems Software Requirements
Patriot Hardware and Systems Software Requirements Patriot is designed and written for Microsoft Windows. As a result, it is a stable and consistent Windows application. Patriot is suitable for deployment
High Availability Databases based on Oracle 10g RAC on Linux
High Availability Databases based on Oracle 10g RAC on Linux WLCG Tier2 Tutorials, CERN, June 2006 Luca Canali, CERN IT Outline Goals Architecture of an HA DB Service Deployment at the CERN Physics Database
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0
DISASTER RECOVERY Omniture Disaster Plan June 2, 2008 Version 2.0 CHAPTER 1 1 Disaster Recovery Plan Overview In the event that one of our data collection environments are unavailable due to an event,
DATACENTER COLOCATION. Flexible, Secure and Connected
DATACENTER COLOCATION Flexible, Secure and Connected Flexible Solutions for Your Requirements Contents Your Goals 2 Compound and Buildings 4 Security 6 Infrastructure 8 Free Choice 10 Good Reasons 12 Our
minova technology electronics
2015 Telemetry, Remote Monitoring and Control Products & Services Server Room Monitoring Depot & Facility Condition Monitoring Cold Storage, Cold Chain Tracking Metering & Pre-paid Systems Management www.tech.com
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
nr 28 nr 68 nr 4 nr 1
SEEB INTERNATIONAL BILL OF QUANTITIES AIRPORT ELECTRICAL WORKS NEW TERMINAL PIER ITEM ITEM DESCRIPTION UNIT QUANTITY BILL PART SECTION No. VOLUME 3 4 UNIT RATE (R.O.) (in words) (in figures) SECTION R:
Business Continuity & Recovery Plan Summary
Introduction An organization s ability to survive a significant business interruption is determined by the company s ability to develop, implement, and maintain viable recovery and business continuity
Brocade Network Advisor High Availability Using Microsoft Cluster Service
Brocade Network Advisor High Availability Using Microsoft Cluster Service This paper discusses how installing Brocade Network Advisor on a pair of Microsoft Cluster Service nodes provides automatic failover
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
SuccessWare 21 Deployment Options
SuccessWare 21 Deployment Options This document is intended for a business owner or manager responsible for IT purchasing and management decisions. It is not a technical specifications document, but rather
PHP/MySQL APPLicAtion HoSting
PHP/MySQL Application Hosting Connectivity DMD PHP/MySQL Hosting is partnered with a Kansas City, USA based Data Center connected to the internet through multiple backbones to ensure that the data is transmitted
** PROPRIETARY ** SAMPLE COUNTY DATA CENTER PROJECT BUDGET ** PROPRIETARY **
1.0 SECTION I - DESIGN AND ENGINEERING FEES 1.0.1 Project Management and Administration Costs $25,000 1.0.2 Architectural and Space Planning 1.0.2.1 Design Development 1.0.2.1.1 Lead Architect 500 $130.0
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
Server Monitoring & Management Services
Server Monitoring & Management Services Monitor and manage your applications and servers under enterprise-class monitoring solutions, and protect your business from planned and unplanned downtime. ITI
Colocation. Scalable Solutions for a Shared IT Infrastructure. Enterprise. Colocation
Scalable Solutions for a Shared IT Infrastructure Global and domestic competition, rising real estate and power costs, and shrinking IT budgets are causing today s businesses to seek alternatives to building
vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service
vcloud SERVICES vcloud SERVICE Virtual Tech offers competitive pricing on vcloud hosted services at our world class Tier 4 data centre facility fully equipped with redundant power, cooling, internet connectivity
MedInformatix System Requirements
MedInformatix System Requirements Acentec, Inc. A MedInformatix installation requires a workstation for each user who will access the system and a central server to store and process the data. A large
Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011
Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011 Opportunities in Automating Infrastructure Why Automation in Data Center? Tiers, compartments and complexity Work
Technical specifications. Containerized data centre NTR CDC 40f+
Technical specifications Containerized data centre NTR CDC 40f+ CONTENT 1 THE PURPOSE OF CDC... 3 2 BASIC PROPERTIES... 4 2.1 EXTERNAL DIMENSIONS... 4 2.2 INSTALLATION REQIREMENTS... 4 2.3 ELECTRICAL CONNECTION
South Asia s First Uptime Institute Certified TIER-IV IDC in Mumbai delivering 99.999% guaranteed uptime
South Asia s First Uptime Institute Certified TIER-IV IDC in Mumbai delivering 99.999% guaranteed uptime GPX India Pvt Ltd The Leader In Carrier Neutral TIER IV IDC s In Emerging Markets Incorporated in
Data Center Management
Data Center Management How Cisco IT Operates, Manages, and Protects Its Data Center A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview The Cisco IT Operations Data Center on the San Jose, California
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
WINNEBAGO COUNTY INFORMATION TECHNOLOGY STANDARDS 2014/2015
WINNEBAGO COUNTY INFORMATION TECHNOLOGY STANDARDS 2014/2015 Platform Architecture Standards: End User Software Platform Architecture Standards: End User Hardware Platform Architecture Standards: Hand Held
What is the Cloud, and why should it matter?
391 12 What is the Cloud, and why should it matter? 23 Everyone seems to be asking about it. No one seems to know exactly what it is, what they need, and where to find it. 4 A Philosophy of Design and
21 st Century Campus Network Responsibility Matrix 5/26/10
Definitions: DoIT Standards This column details the minimal configuration, which DoIT has defined in order to provide a campus-wide standard level of service. Departments may request services, which exceeds
Storage Guardian Remote Backup Restore and Archive Services
Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
join.me architecture whitepaper
join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation
Terms of Reference Microsoft Exchange and Domain Controller/ AD implementation Overview Maldivian Red Crescent will implement it s first Microsoft Exchange server and replace it s current Domain Controller
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
CQG/LAN Technical Specifications. January 3, 2011 Version 2011-01
CQG/LAN Technical Specifications January 3, 2011 Version 2011-01 Copyright 2011 CQG Inc. All rights reserved. Information in this document is subject to change without notice. Windows XP, Windows Vista,
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING
CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING There are hundreds of managed hosting providers that all claim to offer the best managed hosting. But there are vast differences in terms of their reliability,
Comparison of Native Fibre Channel Tape and SAS Tape Connected to a Fibre Channel to SAS Bridge. White Paper
Comparison of Native Fibre Channel Tape and SAS Tape Connected to a Fibre Channel to SAS Bridge White Paper Introduction IT Managers may approach backing up Storage Area Networks (SANs) with the idea of
Next Gen Data Center. KwaiSeng Consulting Systems Engineer [email protected]
Next Gen Data Center KwaiSeng Consulting Systems Engineer [email protected] Taiwan Update Feb 08, kslai 2006 Cisco 2006 Systems, Cisco Inc. Systems, All rights Inc. reserved. All rights reserved. 1 Agenda
Small, Medium and Large Businesses
Providing Productivity and Security for Small, Medium and Large Businesses Series Series Super Fast broadband technology High Availability with Multi-WAN Load Balancing Enterprise-level Firewall security
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците
Hewlett Packard - NBU partnership : SAN (Storage Area Network) или какво стои зад облаците Why SAN? Business demands have created the following challenges for storage solutions: Highly available and easily
Data Center Optimization: Component Choice. Innovative Design. Enabling Infrastructure
Data Center Optimization: Component Choice and Innovative Design Combine to Allow the Creation of an Enabling Infrastructure Data Center Spaces Data Center Spaces as Defined by the TIA 942 Standard Source:
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013
SYSTRUST CERTIFICATION REPORT FOR COLLOCATION AND DATA CENTER HOSTING SERVICES FOR THE PERIOD FROM JANUARY 1, 2013 TO DECEMBER 31, 2013 TABLE OF CONTENTS SECTION I: INDEPENDENT PRACTITIONERS TRUST SERVICES
SAN TECHNICAL - DETAILS/ SPECIFICATIONS
SAN TECHNICAL - DETAILS/ SPECIFICATIONS Technical Details / Specifications for 25 -TB Usable capacity SAN Solution Item 1) SAN STORAGE HARDWARE : One No. S.N. Features Description Technical Compliance
DISASTER RECOVERY WITH AWS
DISASTER RECOVERY WITH AWS Every company is vulnerable to a range of outages and disasters. From a common computer virus or network outage to a fire or flood these interruptions can wreak havoc on your
hosting Hosting Simplified
S E R V I C E S go hosting Hosting Simplified Thinking Future. Moving Ahead. next generation Datacenter Thinking Future. Moving Ahead. go hosting Hosting Simplified T oday, datacenter is the nerve center
IT - General Controls Questionnaire
IT - General Controls Questionnaire Internal Control Questionnaire Question Yes No N/A Remarks G1. ACCESS CONTROLS Access controls are comprised of those policies and procedures that are designed to allow
