Keeping Your Systems Safe, Secure And Operational, 365 Days A Year.
- Physical and environmental security
- Logical and system security
- Operational security
- Backup and disaster recovery
In any business, the security of your mission-critical IT infrastructure is a crucial concern. It doesn’t matter how massive your storage capacity, how fast your servers, or how advanced your applications if they’re running on servers that aren’t safe.
Every year, businesses lose billions of dollars in revenue due to poor security. Cyber-criminals take advantage of firewall vulnerabilities and weak passwords. Viruses wreak havoc on systems, causing performance lag and data loss. Physical damage at data centers leads to server downtime and lost data.
Protecting yourself and your business from these risks should be a top priority for any business. Unfortunately, most businesses do not have adequate measures in place to ensure truly impermeable security. The good news is, when you host your cloud systems with Iron Orbit, you are protected by world-class security measures on four separate fronts:
Physical & Environmental Security
Security starts in the real world—on the physical data centers where your servers are hosted. At Iron Orbit, we take every precaution to ensure that our data centers are protected with the highest level of security possible.
Our onsite network operations center (NOC) and security operations teams (SecOps) are alert and watching 24/7/365 to monitor for any potential security breaches. In addition, our data centers have multilayer security control procedures including biometric palm readers, closed circuit video monitoring and alarm monitoring 24/7. These physical security assets help keep your servers safe from intrusion, theft or any other harm.
In addition, we have gone to great lengths to ensure the environmental security of our premises. Our environmental protection systems include redundant HVAC cooling systems, raised flooring ventilation, smoke detectors and fire suppression systems. Our power systems provide the data center with uninterrupted AC and DC power solutions backed by emergency generators, so your systems stay up and running even in the event of a power outage.
Logical & System Security
Logical security refers to the safety of your software systems, including authentication, access permissions and authority levels. Logical and system security helps keep your systems safe from cyber-attacks, viruses, and malware. At Iron Orbit, we protect your servers from threats and security issues in four major areas:
Network Firewall & IDS/IPS.
All infrastructure is protected by Palo Alto Networks firewalls along with IDS/IPS Systems. Our firewalls stop cyber-attacks and protect both your hosted desktop and your data. Our intrusion Detection Systems/Intrusion Protection Systems (IDS/IPS) detect activity that can compromise the confidentiality, integrity and availability of your servers. Our security engineers perform routine security maintenance to ensure that new threats can be identified and blocked. Finally, we physically isolate whenever possible.
As part of your service, our security operations (SecOps) team regularly installs the latest patches and security upgrades to ensure that your hosted server desktop is protected from the newest and most current threats.
We provide real-time protection against all forms of spyware and malware, keeping your desktops clean and infection free. Before any Internet traffic communicates with the Iron Orbit internal private network, our anti-virus appliance “scrubs” all IP packets to ensure that any malicious threats are blocked.
Our content filtering system filters all web and email content to ensure that malware is blocked from entering your network. Content filtering also protects against inappropriate content to ensure staff efficiency and productivity.
We practice operational security up to and beyond the ISO 17799 standard, ensuring that our entire team follows the required operational policies, practices and procedures. We train and re-train our people on a regular basis, making security a way of life for our operations teams.
Access to sensitive data, applications and servers is restricted to authorized personnel and all system access is logged and tracked for auditing purposes. Our staff follow strict change management procedures to guarantee that any global system change is documented for future audit. By utilizing best practices for password generation, encrypted data storage and customer data, we ensure that your your digital assets are protected to the highest possible standards.
Backup and Disaster Recovery
A major part of security is ensuring that your systems are backed up and protected in the event of a worst-case scenario. Although we take every precaution to ensure that your systems stay functioning at all times, we are fully prepared for any major incident resulting in data loss, including system failure.
We operate a system of geographically redundant data centers across the country. All client data is continually backed up and restored at multiple locations, ensuring that there is always a backup of your system available somewhere. We use proven enterprise virtualization technologies to take snapshots of your hosted server and hosted desktop environment at continuous intervals, so it is always possible to restore your systems to a recent state.