SlideShare a Scribd company logo
1 of 11
DATA CENTER SECURITY:
ALWAYS A MAIN CONCERN FOR BUSINESSES
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES



 •   When it comes to what customers value, data center security tops the list.


 •   Of course, power, cooling, connectivity and other features play important
     roles in evaluating data center performance as well.

 •   But any defects in physical facility security can have devastating effects.
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                            Protecting Against Physical Intrusion
                                                 
•Data center security starts with the physical building being guarded against intrusion.

•A good security model begins with 24/7/365 in-house security staff, layered security
zones, security cameras and 360-degree monitoring.

•It’s also critical to have a safe office to house data center security personnel.

•This office should provide a direct view of all non-alarmed entrance points to the facility.

•The security personnel needs to be able to evaluate and screen all people entering and
exiting the facility.
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                           Protecting Against Physical Intrusion
                                               
•Preferably at the reception area, the data center security office should be enclosed with
strong glass enclosures that can be quickly closed to keep out intruders.

•This space must be able to house security personnel alone so they can evaluate a situation
and call for emergency assistance when needed.

•Proven access control systems must regulate all facility entrances.

•Typical data center security methods for access control include swipe cards, digilocks,
biometrics and turn-style doors that prevent tail-gating.
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                           Protecting Against Physical Intrusion
                                              
•Many data centers use a combination of these methods. Such combinations provide an
excellent deterrent to intrusion attempts.

•Security personnel must also be trained on internal processes regarding
                         Who is authorized to enter the facility?
                           Who can enter to make deliveries?
                         Who can remove equipment for repairs?

•Current access procedures require collaboration and vendor management.
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                   Adding More Eyes and Ears to Data Center Security

•No data center can possibly hire enough security guards to see everything going on in the
facility around the clock.

•Installing cameras and monitoring devices such as CCTV control systems can monitor all
external entrances and any other area of the facility continuously.

•The monitoring system must provide real-time alerts and record all activity for follow-up
review and analysis.

•Alerts should be provided to the security team whether they’re in the security office or
away on security rounds.
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                     Adding More Eyes and Ears to Data Center Security
 
•As with any technology, the monitoring system and security personnel will only be as good 
as the training provided, processes developed and procedures followed.  

•If the internal data center security program is flawed in any way, the facility will be at risk.
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                                     It Boils Down to Trust
 
•Companies select colocation providers for a number of reasons.  

•However, security is always a main concern. 

•After a business does its preliminary assessment of a provider, it then visits the facility to 
evaluate the physical features, including data center security.

•At the end of the day, the customer wants to see stringent security controls and 
monitoring technologies in place.  

•It wants to see sophisticated cameras and monitoring equipment.  
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                                   It Boils Down to Trust
 
•But most of all, companies want to see a professional security team in place around the 
clock.  

•Nothing builds trust more than a properly trained, expert security staff on-site 
continuously.
 
•CyrusOne uses military-grade data center security protocols to protect all physical assets 
and provide zero threat of unauthorized access or infiltration.  
DATA CENTER SECURITY :
ALWAYS A MAIN CONCERN FOR BUSINESSES

                                    It Boils Down to Trust
 
•Our specific security profile includes:
 




      On-site security guards 24/7/365
      Video surveillance and recording of all exteriors and interiors
      Biometric and key card access control
      Turn style doors to prevent tail-gating
      Reinforced physical structure including concrete bollards, steel-lined walls,
        bulletproof glass and barbed wire fencing
 
ABOUT THE AUTHOR
Nicole Aguillard is  the  marketing  director  for  CyrusOne,  a  global 
enterprise colocation provider operating 23 highly secure data centers 
across the United States, London and Singapore.  

For more information about our data center security and colocation 
solutions, please contact us online or call (855) 564-3198 today.

More Related Content

What's hot

Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Jim Gilsinn
 

What's hot (20)

Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 2 phisycal security threat
Chapter 2   phisycal security threatChapter 2   phisycal security threat
Chapter 2 phisycal security threat
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
 
Document Risk Management
Document Risk ManagementDocument Risk Management
Document Risk Management
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
Log monitoring and file integrity monitoring
Log monitoring and file integrity monitoringLog monitoring and file integrity monitoring
Log monitoring and file integrity monitoring
 
PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Introduction to ICS/SCADA security
Introduction to ICS/SCADA securityIntroduction to ICS/SCADA security
Introduction to ICS/SCADA security
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Security Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for BeginnersSecurity Updates Matter: Exploitation for Beginners
Security Updates Matter: Exploitation for Beginners
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Network Security
Network SecurityNetwork Security
Network Security
 
Access-control-system
Access-control-systemAccess-control-system
Access-control-system
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 

Viewers also liked

Urogynics do you exert and squirt
Urogynics   do you exert and squirtUrogynics   do you exert and squirt
Urogynics do you exert and squirt
WomensHealthFan
 
Summary-ECSM_4edition
Summary-ECSM_4editionSummary-ECSM_4edition
Summary-ECSM_4edition
Ralf Braga
 

Viewers also liked (14)

Looking Under the Hood of the High Performance Computing Industry
Looking Under the Hood of the High Performance Computing IndustryLooking Under the Hood of the High Performance Computing Industry
Looking Under the Hood of the High Performance Computing Industry
 
Build vs. Buy: 5 Key Steps to Overcoming Capital Constraints in the Data Center
Build vs. Buy:  5 Key Steps to Overcoming Capital Constraints in the Data CenterBuild vs. Buy:  5 Key Steps to Overcoming Capital Constraints in the Data Center
Build vs. Buy: 5 Key Steps to Overcoming Capital Constraints in the Data Center
 
Taking a Fresh Look at the Build vs. Lease Decision
Taking a Fresh Look at the Build vs. Lease DecisionTaking a Fresh Look at the Build vs. Lease Decision
Taking a Fresh Look at the Build vs. Lease Decision
 
Urogynics do you exert and squirt
Urogynics   do you exert and squirtUrogynics   do you exert and squirt
Urogynics do you exert and squirt
 
Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?Whats New in OSSIM v2.2?
Whats New in OSSIM v2.2?
 
Summary-ECSM_4edition
Summary-ECSM_4editionSummary-ECSM_4edition
Summary-ECSM_4edition
 
Campus jueves
Campus juevesCampus jueves
Campus jueves
 
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
Cloud Security Alliance, Atlanta Chapter Meeting Q1 2012 - SSAE16 SOC 1 2 3 I...
 
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...Information Technology (IT) Security Framework for Kenyan Small and Medium En...
Information Technology (IT) Security Framework for Kenyan Small and Medium En...
 
Iso2700
Iso2700 Iso2700
Iso2700
 
схемы по политике кибербезопасности
схемы по политике кибербезопасностисхемы по политике кибербезопасности
схемы по политике кибербезопасности
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework 2010-02 Building Security Architecture Framework
2010-02 Building Security Architecture Framework
 
How Can Businesses Benefit from an Internet Exchange?
How Can Businesses Benefit from an Internet Exchange?How Can Businesses Benefit from an Internet Exchange?
How Can Businesses Benefit from an Internet Exchange?
 

Similar to Data Center Security: Always a Main Concern for Businesses

Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
Nicholas Davis
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Mark Simos
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
RAJESH S
 
Commercial and government cyberwarfare
Commercial and government cyberwarfareCommercial and government cyberwarfare
Commercial and government cyberwarfare
Nicholas Davis
 
Commercial And Government Cyberwarfare
Commercial And Government CyberwarfareCommercial And Government Cyberwarfare
Commercial And Government Cyberwarfare
Nicholas Davis
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
Muhammad Mudassar
 

Similar to Data Center Security: Always a Main Concern for Businesses (20)

Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Soc
SocSoc
Soc
 
Physical security
Physical securityPhysical security
Physical security
 
How To Secure MIS
How To Secure MISHow To Secure MIS
How To Secure MIS
 
The Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptxThe Open Group - ZT Commandments and Reference Model.pptx
The Open Group - ZT Commandments and Reference Model.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
CISM_WK_3.pptx
CISM_WK_3.pptxCISM_WK_3.pptx
CISM_WK_3.pptx
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Commercial and government cyberwarfare
Commercial and government cyberwarfareCommercial and government cyberwarfare
Commercial and government cyberwarfare
 
Commercial And Government Cyberwarfare
Commercial And Government CyberwarfareCommercial And Government Cyberwarfare
Commercial And Government Cyberwarfare
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Performing One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust PrinciplesPerforming One Audit Using Zero Trust Principles
Performing One Audit Using Zero Trust Principles
 
What You Didn't Know About Data Centre Audit Certification?
What You Didn't Know About Data Centre Audit Certification?What You Didn't Know About Data Centre Audit Certification?
What You Didn't Know About Data Centre Audit Certification?
 
Enhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring ServicesEnhancing Security With CCTV Monitoring Services
Enhancing Security With CCTV Monitoring Services
 
Viseum security-site-survey
Viseum security-site-surveyViseum security-site-survey
Viseum security-site-survey
 
Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 

Recently uploaded

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Data Center Security: Always a Main Concern for Businesses

  • 1. DATA CENTER SECURITY: ALWAYS A MAIN CONCERN FOR BUSINESSES
  • 2. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES • When it comes to what customers value, data center security tops the list. • Of course, power, cooling, connectivity and other features play important roles in evaluating data center performance as well. • But any defects in physical facility security can have devastating effects.
  • 3. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES Protecting Against Physical Intrusion   •Data center security starts with the physical building being guarded against intrusion. •A good security model begins with 24/7/365 in-house security staff, layered security zones, security cameras and 360-degree monitoring. •It’s also critical to have a safe office to house data center security personnel. •This office should provide a direct view of all non-alarmed entrance points to the facility. •The security personnel needs to be able to evaluate and screen all people entering and exiting the facility.
  • 4. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES Protecting Against Physical Intrusion   •Preferably at the reception area, the data center security office should be enclosed with strong glass enclosures that can be quickly closed to keep out intruders. •This space must be able to house security personnel alone so they can evaluate a situation and call for emergency assistance when needed. •Proven access control systems must regulate all facility entrances. •Typical data center security methods for access control include swipe cards, digilocks, biometrics and turn-style doors that prevent tail-gating.
  • 5. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES Protecting Against Physical Intrusion   •Many data centers use a combination of these methods. Such combinations provide an excellent deterrent to intrusion attempts. •Security personnel must also be trained on internal processes regarding Who is authorized to enter the facility? Who can enter to make deliveries? Who can remove equipment for repairs? •Current access procedures require collaboration and vendor management.
  • 6. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES Adding More Eyes and Ears to Data Center Security •No data center can possibly hire enough security guards to see everything going on in the facility around the clock. •Installing cameras and monitoring devices such as CCTV control systems can monitor all external entrances and any other area of the facility continuously. •The monitoring system must provide real-time alerts and record all activity for follow-up review and analysis. •Alerts should be provided to the security team whether they’re in the security office or away on security rounds.
  • 7. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES Adding More Eyes and Ears to Data Center Security   •As with any technology, the monitoring system and security personnel will only be as good  as the training provided, processes developed and procedures followed.   •If the internal data center security program is flawed in any way, the facility will be at risk.
  • 8. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES It Boils Down to Trust   •Companies select colocation providers for a number of reasons.   •However, security is always a main concern.  •After a business does its preliminary assessment of a provider, it then visits the facility to  evaluate the physical features, including data center security. •At the end of the day, the customer wants to see stringent security controls and  monitoring technologies in place.   •It wants to see sophisticated cameras and monitoring equipment.  
  • 9. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES It Boils Down to Trust   •But most of all, companies want to see a professional security team in place around the  clock.   •Nothing builds trust more than a properly trained, expert security staff on-site  continuously.   •CyrusOne uses military-grade data center security protocols to protect all physical assets  and provide zero threat of unauthorized access or infiltration.  
  • 10. DATA CENTER SECURITY : ALWAYS A MAIN CONCERN FOR BUSINESSES It Boils Down to Trust   •Our specific security profile includes:    On-site security guards 24/7/365  Video surveillance and recording of all exteriors and interiors  Biometric and key card access control  Turn style doors to prevent tail-gating  Reinforced physical structure including concrete bollards, steel-lined walls, bulletproof glass and barbed wire fencing  
  • 11. ABOUT THE AUTHOR Nicole Aguillard is  the  marketing  director  for  CyrusOne,  a  global  enterprise colocation provider operating 23 highly secure data centers  across the United States, London and Singapore.   For more information about our data center security and colocation  solutions, please contact us online or call (855) 564-3198 today.