Guarded by a multi-dimensional security system, it is a brand-assured choice.
-
Physical Security
-
Data Security
-
Network Security
-
Application Security
-
Inspection and Audit Security
-
Physical Security
-
Data Storage Computer Room
An IDC facility planned, designed, and constructed in accordance with T3+ international standards.
-
Power System
35KV independent substation with dual independent power feeds
UPS: 4 sets in 2N configuration with dual 10KV independent municipal power feeds
Power distribution: Dual UPS supplying power to server cabinets
Backup power: N+1 diesel generator system with dual diesel supply
-
Security System
Three-layer protection
24/7 security personnel stationed in the computer room
Security scanning system
Identity verification
360° comprehensive video surveillance
-
Network System
Carrier-neutral (BGP) interconnected with China's three major carriers: China Telecom, China Unicom, and China Mobile
Dual-feed, dual-carrier data center
-
Cooling System
N+1 configured Carrier chillers with dual water circulation systems
24-hour full-load capacity water storage tanks, and 15-minute full-load capacity chilled water storage tanks
Each precision air conditioner is equipped with dual chilled water pipes. Features underfloor air supply, isolated hot and cold aisles, and enclosed cold aisle design
Temperature range: 22±2°C; Humidity range: 50±10%
Ranged water leak detection system
-
-
Data Security
-
Code Generation Process
System-automated code generation mechanism prevents human interference in the creation of codes.
-
Storage Process
Dual-encryption mechanism for codes eliminates the risk of accidental data leakage.
-
Transmission Process
Local encryption mechanism for codes prohibits unauthorized computers from decrypting data.
-
Printing Process
Immediate deletion of codes after printing prevents leakage of printed codes.
-
Disposal Process
Designated incineration mechanism prevents discarded identifiers from being reused.
-
-
Network Security
-
Network Firewall
Conceals application network architecture, minimizes network access permissions, and blocks cyber-attacks.
-
IDS/IPS System
Identifies and filters various attack behaviors while coordinating with network devices to fend off unauthorized attacks.
-
Virus Firewall
Serves as the first-line network virus gateway, regularly updates virus databases, and identifies and blocks viruses at the network entry point.
-
-
Application Security
-
Application Firewall
Blocks web-based attacks, provides early warning notifications, and ensures comprehensive platform protection.
-
Penetration Testing
Simulates hacking behaviors to test and evaluate the system's security resilience.
-
-
Inspection and Audit Security
-
Dynamic Awareness System
Utilizes big data and AI algorithms to analyze various logs and assess the platform's security status.
-
Vulnerability Scanning System
Conducts security audits on applications within the data center systems and performs vulnerability remediation based on scan results.
-
Account Management
Manual audits of network devices, AD, system accounts, and VPN accounts.
-
Bastion Host
Tracks operator-application interactions, logs operational behaviors, and traces abnormal activities.
-
Database Audit System
Audits and restricts access to databases by applications and personnel, preventing application anomalies or unauthorized access.
-