DC Two Logo
Veeam Cloud Security

About DC Two

Site Map

Security in the DC Two Veeam Cloud Backup and Replication platform is deployed in a multi-layered approach with security features including;

Firewalls

A Firewall is a device designed to permit or deny network transmissions based upon a set of rules and DC Two uses both hardware Juniper SRX firewall/security devices and hardened Linux software Firewall Appliances to secure our networks.

VPN Connectivity to your Veeam Proxy

DC Two recommends connecting a secure VPN tunnel between your primary site and your private Firewall appliance which could be deployed as either a physical device or as a virtual appliance. In addition to the standard features deployed, you have the option of deploying additional security features to meet your specific needs. You can learn more about those Additional Options here.

Active Intrusion Detection

DC Two has deployed an Active Intrusion Detection System (IDS) to monitor and secure our networks and systems for malicious activities.

Most network providers have only implemented standard IDS systems whereby they will be notified if there is a problem, but most of the time, by the time you realise there is a problem, it can be too late, whereby with an Active IDS system, the system itself will watch for malicious activities and pro-actively block and engage with the potentially malicious traffic itself.

VLANs

A Virtual Local Area Network (or VLAN) has the same attributes as a physical Local Area Network (or LAN), but it is configured and run 'in memory' within the networking and communications equipment (switches and routers). A VLAN can also span across multiple switches and communications connections which can allow the VLAN to stretch out to connect remote sites.

VLANs are an ideal and very secure way to divide up network resources to allow multiple customers to share the same physical resources.

Network Segmentation

To ensure that the various network traffic segments do not interfere with each other, we have divided our internal network up into multiple VLANs. Network segmentation via VLANs keeps all of the network traffic such as SAN storage, internet, management, client data and any other traffic types completely separated from one another and unable to interfere and cause issue between each other.

Back End Hardware Management

All of the back end physical management interfaces and ports which control the base functions of physical servers, storage and networking hardware equipment are connected to their own completely separate physical network to ensure maximum security and segmentation and ensure that we always have full unencumbered access to control the entire platform, regardless of external communications.

Monitoring

All of the DC Two systems are monitored and checked every minute of every day by multiple alerting and notification systems to ensure that we can be on-top of any issues pro-actively, before they become a problem.

 

 

For further information or if you have any queries please do not hesitate to call our friendly team on +61 (0)8 6141 1011 or email us at info@dctwo.com.au

IBM Partner   VMware vCloud Powered   MS Partner   Veeam Gold Cloud Provider Logo   Juniper   APNIC   Datacentre.me logo