Engineers from La Salle-URL share the latest news and projects in the field of network solutions in telematic engineering.

14 June 2015 | Posted by Redacción Data Center

Data Center Security

In this post we will talk about a fundamental aspect of any service: security. As more critical and sensitive is service, more potential attacks could receive from other organizations (like competitor corporations, governments, crackers ...). And our case, a bank, is a very sensitive target because treats with a lot of money and this is very attractive.

For that reason it will be necessary to design a good security system for our data center where we can avoid attacks and we can control all traffic that pass through our networks.

Data Center Security

We will need different devices and software to carry out these tasks:

  • External firewalls: to protect unwanted outside connections and to control data center access.
  • Internal firewalls: to separate networks and services to protect them from an internal attack or a malicious access in another network, in this way we can protect each service and network depending on its criticality. In addition, allow to assign permissions at different user groups.
  • DDoS Detector: boundary device which can detect denial of services attacks and which acts as a DDoS packet dropper. In this way, we can provide a good service to our clients.
  • IPS (Intrussion Prevention System): to detect intrusions and apply automatic measures to avoid them on our data center.
  • Anti-Spam solutions: permits to classify emails depending on its trust.
  • DLP (Data Loss Prevention): systems which permits to recover previous data after significant events on network (attacks, failures) and allow to recover this information and compare its status between two different moments.

With all of these security systems we can assure a better reliability and security of our data center, and that permits a better trust for our customers.

In addition, periodically we commissioned security audits to test data center by external entities.

Share