Our

Servers and Security

Data and Security

Our Servers  

We have pioneered the concept of a globally distributed data center. Our data center is a globally distributed collection of redundant server infrastructure which hosts all our Products and Services.

Prominent features of our intermediary data center

  • Integrates distributed servers seamlessly
  • Provides high-availability, redundancy and unmatched reliability  

Technology  

Our servers are co-located in USA datacenters and have state of the art facilitates that allow us to offer a 99.9% uptime guarantee. All our co-located data centers have common important qualifications described below:

Network
The data centers are connected to the internet through Gigabit ethernet connections from separate backbone providers, who each run fiber optic cables into the data center through separate entry points.   
Security
To guard against line failure or intrusion, the data center is staffed 24 hours a day. Movement throughout the facility is escorted at ALL times. There is 24x7 closed circuit monitoring of all areas and entrances. Between the cameras, access control, and the security team, the Data center facilities are pretty secure.   
Power
The total incoming power is a multiple of what is required to run the Data center. There is an ATS (Automatic Transfer switch) in place to automatically kick in a generator in case of a power failure. The data centers are also equipped with redundant UPS systems to ensure clean power.   
Cooling
Redundant A/C systems, each running at a fraction of their capacity, keep the server rooms cool. The units are alternated so that each one is kept in optimal condition.   
Advanced Smoke Detection & Fire Protection Systems
The data centers are equipped with specialized fire detection and protection systems meant specifically for protecting servers as using ordinary water based systems would cause just as much damage as fire.   
Scalability & Reliability
Our Data center consists of a complex mesh of global servers that interact with each other. The entire architecture is built upon common principles of High-Availability and Clustering.This allows us to scale our solutions to match your exponential growth by simply adding infrastructure and linking it to this architecture. You are abstracted from worrying about variables such as scalability, uptime, network response etc. Our cloud servers operate on a very solid infrastructure consisting of Enterprise Class fast SAS & SSD disks, Redundant Network, Protected by RAID and our cloud hosting servers Encrypts end-to-end communications using FIPS standard and also supports SSL.

Security 

 In order to reduce security risks to minimum, a holistic approach to security is required. Our security processes are born out of a clear definition of the threats to our system.  

  • Privacy - Information within our infrastructure and systems will only be accessible by authorized users.
  • Integrity - Data and information within our infrastructure cannot be tampered with by any unauthorized user.
  • Data Protection - Data within the systems cannot be harmed, deleted or destroyed.
  • Identification and Authentication - Ensures that any user of the system is who he claims to be and eliminates chances of impersonation.
  • Network Service Protection- Ensures that networking equipment is protected from malicious hacking attempts or attacks that threaten uptime. 

Backup 

Advance Data Protection and Disaster Recovery Services with Hosting Services and Cloud Servers
We understand that data is the lifeblood of most companies today and organizations increasingly require 100% uptime, where data is constantly online and accessible. We have therefore implemented solid solutions that allow you to protect your data in the unfortunate event of software malfunction, system failure, etc.

Live Backup (RAID Technology) - We use cutting-edge RAID Hardware to protect all data on the server against hard disk failures. This technology works by creating a mirror of all data on more than one hard disk automatically, without any delay i.e. all data is written to multiple hard disks simultaneously so that if any hard disk fails, that hard disk will be marked as deactivated and the system will still continue to function as though nothing has happened by using the copy of the data on the other hard disk(s). The best part is that you do not have to make any changes or special code modifications in your website/applications for this technology to function.

Weekly Server Backups - Important data exists across various locations on a server. Our subject-matter experts have  prepared complex backup scripts that automatically maintain copies of all important files and folders, in a secure manner, on a regular pre-defined interval, such that we can restore a server in the shortest possible time, in the event of a total failure.

Bare Metal Back for SBSCC Cloud Server, MYOB Cloud Server, Accounting Cloud Server, MYOB and QB Shared Hosting Servers - Bare-metal restore is a technique in the field of data recovery and restoration where the backed up data is available in a form which allows one to restore a computer system from "bare metal", i.e. without any requirements as to previously installed software or operating system. Typically, the backed up data includes the necessary operating system, applications and data components to rebuild or restore the backed up system to an entirely separate piece of hardware. In some configurations, the hardware receiving the restore needs to have an identical configuration to the hardware that was the source of the backup, although virtualization techniques and careful planning can enable a bare-metal restore to a hardware configuration different from the original. Disk imaging applications enable bare-metal restores by storing copies (images) of the entire contents of hard disks to networked or other external storage, and then writing those images to other physical disks. The disk image application itself can include an entire operating system, bootable from a live CD or network file server, which contains all the required application code to create and restore the disk images.