Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Similar documents
Secure, Scalable and Reliable Cloud Analytics from FusionOps

Why All Data Centers are Not Created Equal

Security from a customer s perspective. Halogen s approach to security

FormFire Application and IT Security. White Paper

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Itron Cloud Services Offering

ProjectManager.com Security White Paper

KeyLock Solutions Security and Privacy Protection Practices

IBX Business Network Platform Information Security Controls Document Classification [Public]

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Privacy + Security + Integrity

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SaaS Security for the Confirmit CustomerSat Software

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Time to Value: Successful Cloud Software Implementation

Enterprise level security, the Huddle way.

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

custom hosting for how you do business

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Hosted SharePoint: Questions every provider should answer

Cherwell Software Hosted Environment

Cloud Vendor Evaluation

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Perceptive Software Platform Services

Managed Hosting Evaluating Blackboard Managed Hosting Vs. Self Hosting

Level I - Public. Technical Portfolio. Revised: July 2015

PCI Requirements Coverage Summary Table

Tenzing Security Services and Best Practices

DISASTER RECOVERY. Omniture Disaster Plan. June 2, 2008 Version 2.0

BMC s Security Strategy for ITSM in the SaaS Environment

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

InsightCloud. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

HealthcareBookings.com Security Set Up

White paper. SAS Solutions OnDemand Hosting Overview

Vendor Questionnaire

Security Policy JUNE 1, SalesNOW. Security Policy v v

Cloud Management. Overview. Cloud Managed Networks

StratusLIVE for Fundraisers Cloud Operations

Five keys to a more secure data environment

Projectplace: A Secure Project Collaboration Solution

PROMAPP TECHNICAL INFORMATION

Autodesk PLM 360 Security Whitepaper

White Paper How Noah Mobile uses Microsoft Azure Core Services

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Global ediscovery Client Data Security. Managed technology for the global legal profession

SNAP WEBHOST SECURITY POLICY

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

Hedge Funds & the Cloud: The Pros, Cons and Considerations

Managed IT Secure Infrastructure Flexible Offerings Peace of Mind

Altus UC Security Overview

Powering the Cloud Desktop: OS33 Data Centers

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

PCI DSS COMPLIANCE DATA

PCI Requirements Coverage Summary Table

Our Cloud Offers You a Brighter Future

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SAS 70 Type II Audits

White Paper: Librestream Security Overview

Understanding Sage CRM Cloud

HC3 Draft Cloud Security Assessment

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Birst Security and Reliability

NetSuite Data Center Fact Sheet

System Security Plan University of Texas Health Science Center School of Public Health

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

Fully Managed Secure Data Sharing (a cloud service)

SaaS Security for Confirmit Horizons

Blackboard Managed Hosting SM Disaster Recovery Planning Document

Remote Disaster Recovery Services Suite (nvision Edition)

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Cloud Contact Center. Security White Paper

CompTIA Cloud+ 9318; 5 Days, Instructor-led

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

Supplier Security Assessment Questionnaire

SITECATALYST SECURITY

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

5054A: Designing a High Availability Messaging Solution Using Microsoft Exchange Server 2007

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Security & Infrastructure White Paper

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Enterprise Architecture Review Checklist

Securing the Service Desk in the Cloud

CloudDesk - Security in the Cloud INFORMATION

Office of Information Technology Hosted Services Service Level Agreement FY2009

REDCENTRIC MANAGED SERVER SERVICE DEFINITION

Transcription:

Las Vegas Datacenter Overview Product Overview and Data Sheet

Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active Network a core strength, and it s what sets us apart from the competition. Our commitment is to consistently maintain a state-of-the-art data center and application infrastructure that is supported by a team of highly skilled, highly trained, technology professionals to keep your data always on, safe, and secure. This document is intended to provide an overview into the various capabilities of our hosted SaaS product. Areas of focus are: Datacenter Overview Datacenter Capabilities Security Physical Security Network Security Data Security Testing PCI Compliance Operations Product Design SLAs Monitoring and Response Data Protection (Backups) Disaster Recovery Redundancy SLA Data Center Overview The Active Network Operates three major datacenters located throughout North America with our primary datacenter being located in Las Vegas, Nevada. Switch SuperNap Las Vegas, NV Equinix Ashburn, VA Verizon Toronto, Canada Datacenter Capabilities Our primary datacenter is designed to meet the Uptime Institute s Tier IV datacenter standards and incorporates multiple active power and cooling distribution paths, has redundant components, and is fault tolerant; providing 99.995% availability of those functions. Power availability is enabled by a facility-wide uninterruptable power supply (UPS) and on-site generators. In the event of any local/regional blackouts or disaster, the datacenter would continue to provide uninterrupted power to systems for several days without refueling of the generators. Cooling

at Switch is a patented; state-of-the-art system that completely separates cold and hot air flows. This proprietary design allows for highly dense computing environments that many other datacenters cannot support. All Datacenters hold a current SAS70 or SSAE16 certificate and can be provided on request. Security Physical Security Our datacenters implement five layers of physical security today. 1. Perimeter Blast walls, locked gates, no clear avenue of approach/entry and lack of exterior signage. 2. Exterior Walls Reinforced concrete with a minimum of reinforced, alarmed doors. Perimeter video cameras. Entry to lobby requires verification against an authorized list. 3. Mantraps Once inside the lobby, entry to datacenter is blocked by steel mantraps. 4. Manned Access Control Access beyond the mantrap requires ID and biometric authentication controlled by 24/7 armed guards. Additional audio and camera surveillance are implemented. 5. Caged Spaces Within the datacenter, all Active Network operated equipment is separated and contained within an individually locked and monitored cage. Security staff members at our primary datacenter are hired with military and security experience and complete an extensive training period, which includes security system instruction, procedure and policy instruction, and nonlethal weapon training. Network Security Digital traffic into and out of the facility goes through multiple layers of firewall and denial-of-service hardware based protection using best-in-class equipment from manufacturers such as Juniper, Cisco, and F5. All network communication to the Active Network equipment is via SSL cryptographic protocol. This ensures that information is secured at the transport layer, end-to-end, using 128-bit encryption keys. Application and data servers for each of our environments reside in its own segmented network environment separated from network access by a DMZ that is protected by our own double layer of enterprise class firewalls. Our team of CISSP certified professionals uses a comprehensive suite of software and hardware tools to inspect network activity, watching for and protecting against any external threats. Data Security All customer account information is encrypted in the database and strong passwords are enforced by the application interface. Data access is only allowed through specific service accounts that have server and process specific permissions. The entire operating system layer security is protected by the extended symmetric key cryptography, developed by MIT, built into Microsoft s Active Directory security architecture. Our integrated application security architecture prevents anyone but the customer from accessing their data. This security model is reapplied with every request and enforced for the entire duration of a user session. Systems Security Our information security team is constantly apprised of new vulnerabilities from our technology vendors and security forums. We additionally utilize frequent scans of our infrastructure to detect and notify of potential risks in our environment. Upon discovery new risks are ranked in accordance to the National Vulnerability Database Common Vulnerability Scoring System. Remediation is prioritized according to the risk and can be fully tested and deployed within a matter of days if needed. Anti-virus software is utilized on all company computers and servers and managed via a central management

console that continually keeps the software and virus definitions up to date. Testing Our products are regularly tested from the Internet for vulnerabilities with industry leading audit review and penetration testing expert TrustWave. They test our sites monthly to ensure we pass the highest published payment industry and government standards. TrustWave Secure certification is fully accredited to meet the scanning requirements for the Payment Card Industry (PCI) standard used by Visa, MasterCard, American Express, and other consumer credit providers. Active Network also conducts weekly internal vulnerability scans to identify potential areas of risk and drive remediation on an ongoing basis independent of our external scans. PCI Compliance In addition to the many different security measures we take, we are required to participate in Visa s Payment Card Industry (PCI) data security standards compliance audit and hold a current Level 1 Payment Processor Certification for all our payment processing. The PCI standards cover everything from network security, to application security, to background screening of our employees. For further information on our AMS payment service please refer to the document Active Platform Solutions Data Sheet, Active Merchant Services (AMS). Operations Monitoring and Response All systems that are required for supporting the application and services are fully monitored by a suite of tools. We perform monitoring, alerting and notification on multiple tiers of the technology architecture. Core Infrastructure Monitoring Our entire technology stack, which includes Storage, Network and Compute are monitored 24x7. System metrics such as CPU, memory, disk space and services are continually monitored to ensure that they are operating with in the defined ranges. When certain thresholds are reached or exceeded our monitoring systems notify IT professionals to take action. Customer Experience Monitoring We also monitor for many aspects of the customer experience. To do so, we implement a separate 3 rd party service that continuously tests our web facing products for key functions from a variety of geographic locations, beyond our own data centers. Should error conditions occur in any of our monitoring tools, alerts are immediately forwarded to engineering staff for investigation and resolution. We also operate a network operations center (NOC) that is fully staffed 7/24/365. The NOC constantly monitors the conditions in our datacenter environments and the availability and performance of our products. The NOC can engage the appropriate engineering personnel whenever needed, escalate to several layers of management, and utilize a variety of internal communication methods to ensure any problems are addressed quickly.

Data Backup Critical customer data contained in the database is backed up on a regular basis throughout the day, with transaction logs backed up numerous times per hour, differential backups performed nightly and full backups weekly. Backups are also regularly replicated to a secondary datacenter for offsite storage. We retain daily backups for 2 weeks and a 1 st of the month full backups stored for 1 year at both local and offsite locations before overwriting them. Because we utilize an online form of backup storage vs. tapes, restoration of data, should it be required, can be done in near real time vs. the hours or days it may take to recover from tape based media. Disaster Recovery By default, the Active Network continuously replicates the critical data for all of its products in Las Vegas to a secondary, stand-by disaster recovery site. In the event of a condition such as a regional disaster that would prevent recovery of services within the primary datacenter for 3 days or more, recovery operations in the secondary datacenter could begin. Contact your service delivery manager for which products have live disaster recovery capabilities today. Product Design Redundancy All systems associated to Las Vegas hosted products are part of fully redundant pools of devices. This means that the loss of a single web server or network device, for example, would not impact functionality and the majority of device failures would be completely transparent to the user. In many cases multiple devices could be lost or removed from service to perform maintenance activities without user disruption. Load balancers are utilized to spread customer load across web and application servers and continuously optimize end-user performance and availability. The critical database tier is also part of a clustered pair enabling maintenance activities as well as failure recovery with a minimum of customer interruption. Service Level Agreements (SLAs) Hours of Operations 7/24/365 Scheduled Maintenance Window Depends on hosted product Datacenter Uptime Objective 99.995% Hosted Product Uptime Objective 99.9%