![]() |
Only authorized data center personnel are granted access credentials to our data centers. No one else can enter the production area of the datacenter without prior clearance and an appropriate escort. | ![]() |
![]() |
Keycard protocols, biometric scanning protocols and round-the-clock interior and exterior surveillance monitor access to every one of our data centers. | |
![]() |
Security camera monitoring at all data centre locations | |
![]() |
24x7 onsite staff provides additional protection against unauthorized entry | |
![]() |
Unmarked facilities to help maintain low profile | |
![]() |
Physical security audited by an independent firm | |
![]() |
Every data center's HVAC (Heating Ventilation Air Conditioning) system is N+1 redundant. This ensures that a duplicate system immediately comes online should there be an HVAC system failure. | |
![]() |
Every 90 seconds, all the air in our data centers are circulated and filtered to remove dust and contaminants. | |
![]() |
Should a total utility power outage ever occur, all of our data centers' power systems are designed to run uninterrupted, with every server receiving conditioned UPS (Uninterruptible Power Supply) power. |
![]() |
System installation using hardened, patched OS | ![]() |
![]() |
System patching configured to provide ongoing protection from exploits | |
![]() |
Dedicated firewall and VPN services to help block unauthorized system access | |
![]() |
Data protection with managed backup solutions. | |
![]() |
Optional, dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access | |
![]() |
Distributed Denial of Service (DDoS) mitigation services based on PrevenTier™ system. | |
![]() |
Risk assessment and security consultations carried out regularly by professional services teams from Rackspace | |
![]() |
All employees trained on documented information security and privacy procedures |
![]() |
![]() |
Access to confidential information restricted to authorized personnel only, according to documented processes |
|
![]() |
Systems access logged and tracked for auditing purposes |
|
![]() |
Secure document-destruction policies for all sensitive information |
|
![]() |
Fully documented change-management procedures |
|
![]() |
Secure Socket Layers (SSL) encrypts all transmitted data |
|
![]() |
All passwords encrypted during transmission using one way Blowfish encryption 256bit |
|
![]() |
Dedicated Cisco firewall restricts access to your permitted networks (generally by NAT) |
|
![]() |
Secure media handling and destruction procedures for all customer data |
|
![]() |
Support-ticket history available for review. |
|
![]() |
Independently audited disaster recovery and business continuity plans in place. | |
![]() |
nISO17799-based policies and procedures, regularly reviewed as part of our SAS70 Type II audit process |
|
![]() |
Full system audit trail stored as part of client system and attached at record level. | |