When dealing with millions of GBs of data (petabytes), the utmost care must be taken to ensure that customer data is protected and preserved by adhering to the highest standards of data security and by providing systems that guarantee the integrity of the data. Although many cloud service providers talk a lot about data encryption, most don’t discuss or provide mechanisms to guarantee the integrity of the data, which is equally as important. After all, what good is your data if it becomes corrupted or damaged?

Silent data corruption is a real threat to your data. In a recent study by CERN, silent data corruption was observed in 1 out of every 1500 files. Redundant storage, RAID, mirroring, checksums on individual components, replication, and even backup are not sufficient to protect against silent data corruption. If data is silently corrupted without detection, this corrupted data is then replicated or backed up, thereby corrupting any redundant or backup copies. The causes of silent data corruption are many and include hardware, firmware, and software faults.

Our data integrity protection systems are second to none. Our end-to-end 256-bit checksums “tag” your data with cryptographically verifiable identifiers, and these checksums are then used to verify the integrity of the data throughout the entire process. If corruption within a particular block is detected, a redundant copy of that block is used to automatically repair the corruption.

Real-time monitoring of all networks, servers, services, storage, and other key IT infrastructure is critical to providing reliable cloud services you can depend upon. We use two separate external and an internal automated monitoring systems, which leverage differing technologies to monitor the same systems. This diversity of monitoring technologies and systems ensures that our engineers will always be alerted of degradations in fault tolerance or performance. Alerts are processed 24/7/365 by our team of engineers.

  • Ability to virtually boot failed server(s), workstation(s), any client device in our cloud if disaster strikes
  • Backups as often as every 15 minutes
  • Data Integrity Protection
  • Real-time monitoring