Cloud Security Service

logo2Virtual Security Layers: Quasar has multiple layers of network and virtual security for both Cloud Service and Colocation customers. These features are designed to keep your network and data secure.

content01

 

  • Privilege Separation: Several network capability and access control techniques are used to ensure privilege separation and mandatory access control
    • Virtual disks are provisioned to singular virtual servers or “machines”
    • The network is segregated by VLANs and each customer has their own dedicated Firewall and VPN tunneling.
  • Firewalls: Checkpoint and Endian Firewalls are systems used to help protect computers and computer networks from attack and subsequent intrusion by restricting the network traffic based on a set of system administrator-defined rules
  • Cryptopgraphic/Encryption: Cryptographic techniques are used to defend data in transit between systems, which ensures that data exchanged between systems canmot be intercepted or modified
    • SSL and IPSec Protocols for data transmission
    • Encrypted File System (Hard drives) for data at rest
  • Remote Desktop Protocol (RDP): Quasar leverages RDP protocol used by Microsoft Terminal Services for remote desktop access. RDP uses the 128-bit RC4 encryption algorithm, the same algorithm used by SSL for HTTPS and WEP for wireless.
  • Malware, Anti-Virus/Spam: Anti-virus software computer programs are used to identify, thwart and eliminate computer viruses and other malicious software (malware).
  • Intrusion Detection: Proactive Intrusion-detection systems such as Alert Logic and Cauldron are used to scan the network for potential Disruptive Denial of Service (DDOS) threats such that they can immediately be isolated and prevent any network disruption.
  • User Authentication/Access: The Quasar Cloud supports a variety of authentication and authorization mechanisms. Depending on the customer preference, options include NTLM (default option), Kerberos, SSO, RADIUS, LDAP, and RSA secureID.
  • Network Security Plan: This SSAE16 verified plan outlines the Privacy and Acceptable use of computer equipment at Quasar
  • Loss of Primary Network: Redundant network capability and Business Continuity Solutions
  • User Security: Development of Customized Network Security Plan and employee network security training
  • Ethical Hacking: Vulnerability testing and network hardening

 

security-center

Physical Security Layers: Physical entry to Quasar’s Network Operations Center (NOC) and datacenter is controlled through a SMART card system, authorized customer access lists and access control procedures to prevent unauthorized entry.

  • Building Security – 24/7 Guards
  • Continuous CCTV Monitoring
  • Electronic SMART Card Access control to Facility
  • Customer access control procedures
  • Locked cabinets
  • Cage and Private Suite Options
  • Redundant servers, power supplies, network switches and off site system replication provide backup and business continuity functionality