Network Infrastructure

Highlights of GOLS server farm hosted at Internet Data Centre
  • Servers hosted in international level internet Data Centre
  • Over 25 high end servers and growing
IDC Co-location facilities offer an N+n redundant environment for ultra reliable operations.
N+1 redundancy is achieved through a relatively new power sharing technology. This simply means that all the modules in the power scheme run in parallel fashion and evenly share the load. The redundancy part means that one additional module is being run to support the load, thus allowing each load to support one another. So, even if one module fails, another is there in its place to pick up the load. Because a reliable power supply is a crucial part of business survival, this type of structure is ideal for any operation where a power failure just cannot be tolerated.
The utilization of N+1 power is the most efficient and cost effective way to achieve the high level of reliability required in today’s business environment.
Network Infrastructure - Data Security (internal / external) and Data Confidentiality

Network Reliability
24x7 Network Operations Center (NOC) at IDC, continuously monitors the health of all components including switches, routers, servers, applications, firewalls, leased links and Internet traffic flowing through IDC network
Security Practices
  • Hosting environment includes several layers of security
  • Best practices for keeping data secure between internal and outside systems such as an end-user browser (SSL, Firewall etc.)
Secure Socket Layer (SSL):
uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https instead of http
*Firewall :
A firewall’s basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a “perimeter network” or Demilitarized zone (DMZ).
Physical Security at IDC :
Only GOLS authorized staff is allowed access to servers Co-located at IDC, which consist of multiple layers of security that includes Physical identification at point of entry, Biometrics for access to server hall and video surveillance
Client Data Confidentiality
  • Confidentiality and non-disclosure agreement with each employee at the time of appointment
  • Policy of sharing information on need-to-know basis
  • If needed, confidentiality agreement from each team member on the project can be obtained specifically for a project / client
  • IT security measures such as access control, passwords for individual employees, restrictions on sending attachments outside, disabling CD / USB copying from workstations
  • General practice of signing NDA with clients
  • Security measures like access control, attachment restrictions, disabling USB / CD copying, data access restrictions using the latest in document management / control systems (Powered by Microsoft)
  • Access control restrictions in Office + IDC (Access card + bio-metric)
  • 24/7 CCTV surveillance
* Gols uses state-of-the–art firewall at the IDC & HQ as shown in the diagram in the previous page.