Interview:
William Swallow
Director of Incident Response, Cyber Attack Tiger Team (CATT)
Exodus Communications
Exodus
Communications is the world's largest provider of outsourced
data storage. Leading global corporations trust Exodus with
vital information. That requires world-class security - a
challenge Exodus meets with the Cyber Attack Tiger Team (CATT).
HostIndex.com had an opportunity to conduct an
interview with William Swallow - Director of Incident Response,
Cyber Attack Tiger Team (CATT) at Exodus Communications. Here's
what we learned....
HostIndex.com: How many data centers does Exodus currently
own and operate?
William Swallow: Exodus has 44 Internet Data Centers (IDC)
worldwide.
HostIndex.com: How important is structural and virtual security
to Exodus customers? What does Exodus put into the design
of their facilities to ensure security levels are met?
William Swallow: Structural and virtual security is extremely
important to Exodus customers. From the physical security
of its IDCs to its Professional Services, Exodus possesses
the expertise to help safeguard enterprises at every level.
Exodus' team of leading technology experts, combined with
a wide array of leading-edge products and services, provide
corporations with the tools, techniques, and knowledge needed
to protect a business.
Exodus' IDCs provide the physical environment necessary
to keep a company's servers up and running 24 hours a day,
7 days a week. These world-class facilities are custom designed
with raised floors, HVAC temperature control systems with
separate cooling zones, and seismically braced racks. They
offer the widest range of physical security features, including
state-of-the-art smoke detection and fire suppression systems,
motion sensors, and 24x7 secured access, as well as video
camera surveillance and security breach alarms.
<%getBannerByGroup("bottom_main")%>
HostIndex.com: Earlier this year, hackers breached one of
your sites. What has Exodus done since that incident to prevent
similar situations in the future?
William Swallow: While total security is impossible, following
the defacement of an outer layer security web page in May,
Exodus added additional security technology, including the
newly launched Content Integrity Monitoring service, to further
improve the security facilities. Exodus security offerings
are focused on four core areas to address all levels of the
customers' physical, network and virtual environment, and
has the expertise required for implementation.
HostIndex.com: Are different security or structural requirements
needed for data centers located in different regions?
William Swallow: All of Exodus' IDCs are built to meet the
same stringent security standards. The security and integrity
of each Exodus IDC are achieved and maintained by robust facility
construction, comprehensive access controls, video surveillance
monitoring, 24-hour personnel and comprehensive policies and
procedures.
Internet Data Center construction - Critical exterior perimeter
walls, doors and windows are constructed of materials that
afford UL Standard #752, Level V Ballistic Protection.
Access Control - Exodus uses an Access Control System (ACS)
that supports a networked card reader and alarm system. The
ACS uses proximity card readers to control access into perimeter
doors, shipping/receiving areas, storerooms and other critical
areas. Additional access control measures include:
- Access into each IDC is controlled by biometric hand
scanners, and is limited to Exodus authorized personnel
- Exodus cards access badges or contractor/visitor badges
are required to gain entry
- All employees, customers, vendors, contractors and visitors
must be sponsored by an Exodus pre-approved sponsor to gain
access
Security Entrance System - Where installed, an automated
security entrance system is utilized to control access in
the IDC. The systems employ the following key features:
- The system is designed to physically limit access to
one person at a time, no tailgating
- Integrated metal and explosive detection
- Dedicated UPS & Stand-by Emergency Power Generator
- Integrated card access and biometric access control systems
limits access to persons verified by hand geometry
Alarm System - The ACS is used to monitor and log security alarms.
The ACS monitors all:
- Perimeter doors
- Restricted area doors
- Shipping/receiving doors
Closed circuit television system - Exodus security employs and
extensive closed circuit television system to monitor the exterior
and interior of each IDC.
For a virtual tour of Exodus' facilities visit: http://www.exodus.net/idc/idc_tour.html
and http://www.exodus.net/idc/idc_diagram.html
HostIndex.com: We
appreciate the time you have taken to share your marketplace
objectives.
|