Page 2 of 5 FirstFirst 1234 ... LastLast
Results 16 to 30 of 62
  1. #16
    Junior Member
    Join Date
    May 2012
    Posts
    15
    Thanks all for sharing useful information.

  2. #17
    Registered User
    Join Date
    Jan 2012
    Posts
    3
    There is no good way to protect data centers from been attacked.

  3. #18
    Registered User
    Join Date
    Jul 2012
    Posts
    1
    Writing service of this website is very helpful and very informative. Any one an easily learn a lot from the writing service of this website.

  4. #19
    Registered User stevetamer's Avatar
    Join Date
    Apr 2012
    Posts
    188
    Quote Originally Posted by symoncol View Post
    Viruses, spyware, and network threats get most of the attention, but environmental factors like heat, humidity, airflow, smoke, and electricity can be equally devastating to server room equipment, and thus to a company’s IT operations.
    That´s right, Agreed with you
    Eat online revolutionary ordering system for restaurants

  5. #20
    Registered User
    Join Date
    Oct 2011
    Posts
    770
    Data center equipment is very sensitive and susceptible to environmental damage from excessive heat,
    moisture, and unauthorized access. Power outages
    that knock out cooling systems can lead to overheated servers in a matter of minutes.

    Simple thermostats and server-based temperature
    sensors aren’t enough to ensure comprehensive protection. IT organizations need temperature and water
    sensors throughout the data center and at specific
    strategic locations near potential trouble spots. They
    also need door sensors and IP cameras to alert
    administrators in case of unauthorized entry and
    provide real-time views of the space. They also need
    comprehensive management tools to tie the data
    from these sensors together into a cohesive display,
    and to set alarm parameters in case a threshold is
    exceeded.
    Asia Affordable Web Hosting Provider

  6. #21
    Junior Member
    Join Date
    May 2012
    Posts
    28
    Datacenters generally have backup servers at remote location to secure the dats incase of any disaster. t m agree with this...

  7. #22
    Registered User
    Join Date
    Oct 2012
    Posts
    10
    Hello,

    To protect your data centers, firstly you should have a backup server at remote location. But by this you can not protect you data from viruses and spywares. so, you can get protection from these also by using Advanced System Protector. It also provides protection shields against malware threats.

  8. #23
    Registered User
    Join Date
    Nov 2012
    Posts
    10
    if your data center is not optimized to support a combination of cloud, ... and restore service aligning protection options that support your business goals.

  9. #24
    Registered User
    Join Date
    Dec 2012
    Location
    San jose CA USA
    Posts
    3

    re

    In addition to offering enterprise managed IT solutions and cloud hosting solutions, we offer cost effective collocation services in our carrier class data center. Our data centers offer a reliable, secure, and controlled environment for a single server or an entire cage, all with a guaranteed uptime SLA of 99.99%.

  10. #25
    Registered User
    Join Date
    Dec 2012
    Posts
    1
    Companies that are either buying or building data center capability should not take business-continuity and risk-assessment planning for granted. In recent discussions with Baseline, four data center experts made the following recommendations and observations: The first step to preventing a terrorist attack is to raise the awareness of the possibility of attack among your employees. Every site needs a balance between levels of security that are necessary to protect a site and the convenience and ease of access for visitors.Many data centers are built with little concern about site conditions. Data centers are often built adjacent to busy streets, with no buffer zone between the data center and public areas. They are often put in high visibility, multi tenant buildings, with a parking lot shared by all tenants.
    ------------------------------------------

  11. #26
    Member
    Join Date
    Sep 2012
    Location
    London
    Posts
    35
    power issues data backup and security against hackers are a few things to keep in mind

  12. #27
    Junior Member
    Join Date
    Dec 2012
    Posts
    8
    Generally these features relate to potential entry and escape routes, meaning things like positioning the data center door in such a way that only Fairtrade gifts traffic intended for the data center is near the door. Also take care to protect access to critical infrastructure elements such as HVAC and wiring, and prevent potential sources of concealment for intruders.

  13. #28
    Registered User
    Join Date
    Jan 2014
    Posts
    107
    With the advent of cloud computing, rich Internet applications, service-oriented architectures and virtualization, data center operations are becoming more dynamic, with fluid boundaries.

  14. #29
    Registered User
    Join Date
    Mar 2014
    Posts
    95
    First you can use of passwords oan oracle than you save your data on it.


    Executive Summary Example
    Strep Throat Symptoms and Strep Throat Treatments

  15. #30
    Registered User
    Join Date
    Mar 2014
    Posts
    12
    Facility- Card and biometric access points are always important to have. Many DC's have 24x7 on-site security, but having extras like mantraps, video surveillance and access cards can go a long way in protecting the building physically. Many facilities are built away from floodplains and seismic zones, and are built to be structurally sound in the event of a natural disaster. Coastal DC's often are prepared to handle a category 5 hurricane.

    Network- Firewalls, antivirus software and intrusion detection systems are important to have for the network security of the data center. Account access management tools can also be of use for seeing who is doing what and if there were any changes made to software, applications and data.

    The thing to remember, as scary as it sounds, is that regardless of how much you protect yourself and are proactive in your security protocols, if a hacker wants to get in, they'll find a way.

Page 2 of 5 FirstFirst 1234 ... LastLast

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

  Find Web Hosting      
  Shared Web Hosting UNIX & Linux Web Hosting Windows Web Hosting Adult Web Hosting
  ASP ASP.NET Web Hosting Reseller Web Hosting VPS Web Hosting Managed Web Hosting
  Cloud Web Hosting Dedicated Server E-commerce Web Hosting Cheap Web Hosting


Premium Partners:


Visit forums.thewebhostbiz.com: to discuss the web hosting business, buy and sell websites and domain names, and discuss current web hosting tools and software.