Datacenter Details
We love working with businesses to help them grow and make a real difference.
General question
Frequently Asked Questions
01.
We have pioneered the concept of a Globally distributed Datacenter. Our Datacenter is a globally distributed collection of redundant server infrastructure which hosts all our Products and Services.
Salient features of our Datacenter
- Integrates hundreds of distributed servers seamlessly
- Provides high-availability, redundancy and unmatched reliability
Our Datacenter consists of servers distributed across various Datacenters worldwide. Most of these datacenters have certain common qualifications described below -
Network
The datacenters are connected to the internet through Gigabit ethernet connections from separate backbone providers, who each run fiber optic cables into the data center through separate entry points.
Security
To guard against line failure or intrusion, the data center is staffed 24 hours a day. Movement throughout the facility is escorted at ALL times. There is 24x7 closed circuit monitoring of all areas and entrances. Between the cameras, access control, and the security team, the datacenter facilities are pretty secure.
Power
The total incoming power is a multiple of what is required to run the datacenter. There is an ATS (Automatic Transfer switch) in place to automatically kick in a generator in case of a power failure. The datacenters are also equipped with redundant UPS systems to ensure clean power.
Cooling
Redundant A/C systems, each running at a fraction of their capacity, keep the server rooms cool. The units are alternated so that each one is kept in optimal condition.
Advanced Smoke Detection & Fire Protection Systems
The data center's are equipped with specialized fire detection and protection systems meant specifically for protecting servers as using ordinary water based systems would cause just as much damage as fire.
02.
Scalability & Reliability
Our Datacenter consists of a complex mesh of global servers that interact with each other. The entire architecture is built upon common principles of High-Availability, Clustering and n+1 Architecture. This allows us to scale our solutions to match your exponential growth by simply adding infrastructure and linking it to this architecture. You are abstracted from worrying about variables such as scalability, uptime, network response etc.
Global Reach
We and our partners have invested in infrastructure deployments at various locations globally. You can now leverage upon this global infrastructure and offer a completely private-labeled global experience to your Customers without any investments. We handle the selection, negotiation and relationship management with Infrastructure providers around the world.
White Labeled Architecture
Our Datacenter is a cluster of globally distributed redundant servers of various different operating systems to provide your Customers and Resellers with myriad hosting options. The servers, and IP addresses are white-labeled and cannot be traced back to us. If you are one of our Resellers, then the name servers used for any services hosted on these servers would be your branded Name Servers. So for all practical purposes these clusters of hundreds of servers would appear as YOUR servers to your Customers.
03.
Enterprise-grade 24x7 Server Monitoring and Network Security
Discover our robust infrastructure that includes high-availability clusters of diverse machines, operating systems, and applications distributed across multiple continents. Learn more about our Virtual Datacenter.
To guarantee maximum uptime, a reliable monitoring system is crucial. With web service companies managing hundreds of servers, each with numerous services, manually monitoring them 24x7 is an overwhelming task. It's nearly impossible for a human to monitor multiple servers effectively.
In today's fast-paced business environment, companies without reliable monitoring systems face longer downtimes and increased risk of potential damage caused by service disruptions. A minor issue can quickly escalate into a major problem, causing significant damage.
At our company, we use cutting-edge monitoring systems and tools that give our system administrators a comprehensive view of our globally distributed infrastructure. We monitor numerous parameters related to the health of our servers and individual services, ensuring maximum uptime and minimal disruptions to our customers.
04.
Our state-of-the-art monitoring systems cover a wide range of critical services to ensure optimal performance and uptime. Our team of experts monitors:
- Network connectivity
- Server disk space
- Server CPU usage
- Server memory usage
- Web services, including HTTP, HTTPS, and FTP
- Email services, such as SMTP, POP, and IMAP
- Database services, such as MySQL and MSSQL
- DNS services
- All log files
And much more, providing complete coverage and visibility into the health of our infrastructure.
At our company, we take proactive steps to ensure the maximum uptime and minimal service disruptions. Our advanced notification system sends alerts to our Infrastructure Monitoring Staff immediately upon detecting any server or service failures or resource utilization that exceeds specified limits.
Our notification system also handles the escalation of issues. If the issue is not resolved within a set time frame, SMS alerts are sent out to higher level system administrators and subsequently to management. This allows us to quickly detect and resolve any issues within minutes, ensuring minimal disruption to your customers and maximum uptime for your business.
05.
In order to reduce security risks to minimum, a holistic approach to security is required. Our security processes are born out of a clear definition of the threats to our system.
Security Goals
Privacy - Information within our infrastructure and systems will only be accessible by authorized user
Integrity - Data, and information within our infrastructure cannot be tampered with by any unauthorized user
Data Protection - Data within the systems cannot be harmed, deleted, or destroyed
Identification and Authentication - Ensures that any user of the system is who he claims to be and eliminates chances of impersonation
Network Service Protection - Ensures that networking equipment is protected from malicious hacking attempts or attacks that threaten uptime
06.
Our Security Model
Our Security platform and process leverage on multiple levels of security – consisting of Security Systems and Equipment combined with Security Procedures and Practices and Auditing processes, to ensure unparalleled security for all the services we provide. The platform tackles security at 7 different levels
01.
02.
03.
04.
05.
06.
07.
Contact us
You're here! Took you a while.
Get in touch with us and let’s discuss what’s on your mind.