The importance of disaster recovery data room

  In the current rapid development of the Internet today, the security of the data room is also increasingly valued by businesses, then the disaster recovery data room is particularly important, the following five areas we will introduce all aspects of disaster recovery data room on the ground:
  
a Added security:
  1. ground through a server can provide backup to the site conditions no description customers appear in the relocation process.
  2. Provide authorization mechanism to ensure staff into the ground through the room to get customers mandate to ensure the safety of the engine room.
  3. ground through the provision of professional and technical personnel added to our services to ensure the smooth physical link is available.
  4. carry out security checks on moving into server, client-server to improve security, to protect the security room to protect customer safety.
  The ground moved through the device according to the situation and result report, customer information apparatus move time, type, bandwidth, ports, circuitry, ip address, cabinets location register, customer demographics and inspection have been prepared.
  Security: client personnel in charge of the engine room may not have moved as professionals on the ground to provide professional and technical personnel to complete the initial configuration, security and protection of client-server systems, server operating environment security.
  
Two hardware protection:
  1. ground through professional crew, will be a day room temperature, humidity, power, air conditioning, monitoring equipment to check registration, year round.
  2. The customer will ground through the daily inspection device, including status lights, panel information, the card indicator, power indicator, etc., if the error message, the client will be notified through the ground at a first time.
  3. occur during client hosting hardware damage, under the authorization of the customer, the customer can contact the manufacturer for repair, enter the room service manufacturers are required to produce evidence.   
  4. Non-brand server hardware failure, in the client authorization, preliminary fault detecting means is given replacement recommendation.
  Security: ground pass will offer customers hardware status monitoring, equipment repair, initial detection of a fault, courier service, shorten response time after the failure to protect the interests of customers.
  
Three systems guarantee:
  1. If the ground through the data center to the customer after the restart requirement, and attention will be responsible for restarting the device is restarted state, if the abnormal restart, logging exception information and notify customers.
  2. Ruoyin customer misuse, or unknown reasons causes the server can not connect remotely, in case of obtaining customer authorization through the ground before landing the client device to restore remote link.
  3. Because the virus causes or unknown circumstances, causing the system to crash or password failure, etc., through the data center floor in case of receipt of customer authorization, will provide technical services to help customers fix the problem.
  Security: the ground through the data center operation and maintenance personnel or technicians in the health of the server system according to customer requirements, only if authorized, will be the customer's server internal operations, to ensure that in the shortest possible time within recovery client application.
  
Four monitoring guarantee:
  1. floor has a full range of trunk link status through real-time monitoring, real-time security coverage and patency of customer applications.
  2. ground through real-time monitoring of data centers in every room, the protection of the security of user equipment.
  3. ground through the data center in the engine room entrance to the building in real-time surveillance, anti trailing door, ball control, high-definition video, and temperature monitoring to ensure the safety of the room environment and customer data.
  Security: the ground through the data center room network monitoring, security monitoring, data center environmental monitoring, and have someone detection and attention to ensure the security client device hardware, software, systems, environments, etc.
 
*** five security protection:
  binding a large number of policy vlan 1. landline internal configuration of the data center, and the access device can effectively isolate *** ARP.
  2. ground through the data center firewall and UTM appliances, was in the client's server ***, injection, etc. *** When the puppet, provides hardware protection.
  3. Professional security experts on the ground, will provide professional security solutions for target your customers, so that the security of user equipment.
  4. ground through the data center can provide large flow ddos *** Protection Service, responsible for the data center protection and flow of receipt *** cleaning.
  Security: professional security solutions to address customers in a hosted *** threat during the encounter. In the absence of sufficient customer's own technology and equipment strength situations, it can provide an effective solution to circumvent the problem.
  
Six data security:
  1. floor through the use of data center monitoring system to capture full-motion images can be dispatched on entering the room, ensure the safety of customer equipment.
  2. ground through data centers face in access to follow the anti-access, all customers had no direct access to the privileges of the room.
  3. If the customer needs into the ground through the data center, by the data center as a staff to verify the identity of the client, and sent a formal work order, no work order and staff did not verify personnel, and definitely not enter the room.
  4. The person entering the data center must carry valid documents and copies left at the end, undocumented workers are not allowed to enter the room.
  5. Ground on all data center operation and maintenance personnel, under any circumstances not to do anything the customer private data, all data for customers of all, do not receive any mandate for data manipulation.
  Security: from the hardware through ground surveillance, access control, detection, identity verification, authorization management and other aspects to ensure the safety of customer data.
  
Seven operation and maintenance guarantee:.
  1. 7x24 hours, ground support services through
  2. 7x24 hours, landline service cutover
  3. 7x24 hours, round monitor
  4. 7x24 hours, exception handling ***
  5. 7x24 h, the flow rate detecting services
  6. 7x24 hours, *** protective services
  Security: the ground through the data center with 7 * 24 hours year-round shifts, uninterrupted service to meet customer hosting the operation period, anomaly detection, and other services to inform, protect the safety of all aspects of customer equipment data .

Guess you like

Origin blog.51cto.com/14425065/2422500