INFRASTRUCTURE AND SECURITY

Infrastructure and Security

The foundations of our platform and its services

At Jotelulu, we take security very seriously.

We are aware of the importance of security for our customers. That is why we work constantly to provide the most secure infrastructure, platform and services. We work to continuously improve in different areas to maintain and improve our quality and security standards.

Our Data Centres

At Jotelulu, we host our platform and infrastructure in advanced data centres that we have chosen based on strict security, quality, efficiency and connectivity criteria.

 

We host our services in different data centres in Europe, partnering with industry leaders such as Digital Realty (formerly Interxion) and Equinix. They are considered top-tier data centres and are probably among the most advanced built to date. In addition, they are neutral-network data centres and have a broad range of connectivity which allows us to offer greater redundancy and connection availability.

 

Furthermore, our data centres have strict security measures relating to physical access, environmental conditions and power, guaranteeing maximum service quality.

PHYSICAL SECURITY MEASURES

Access to our data centres is controlled by security personnel 24/7. They are monitored by CCTV and can only be accessed with prior authorisation.

Security Measures:

  • 24-hour security guards.
  • 24/7 continuous recording.
  • Metal detector and turnstiles to access the data centre.
  • Cameras on access doors and corridors (external and internal).
Access Control:
  • 5 layers of physical security (access to the perimeter, building, technical rooms, rack wardrobes, etc.)

ENVIRONMENTAL CONTROLS

Our IT equipment is maintained and monitored in controlled environments with SLAs relating to temperature and humidity:

  • Continued refrigeration (24h).
  • Redundant air conditioning equipment.
  • 21°C temperature and relative humidity of 50%.

Similarly, all servers are protected against fire through a sprinkler system designed to extinguish any fire in seconds and without leaving residue:

  • Smoke detectors
  • Automatic extinguishing systems
  • Manual emergency stop buttons in all rooms.
  • Optical and ionic sensors with VESDA system
  • 24/7 monitored alarm system.

POWER SUPPLY

The data centres where Jotelulu hosts its infrastructure are equipped with redundant power supply connections and appropriately sized kinetic diesel generators to support the energy needs of the entire building and all the infrastructure hosted inside it.

DATA CENTRES CERTIFICATED BY INTERNATIONAL STANDARDS:

Redundancy Architecture

At Jotelulu, we have implemented 100% redundant architecture to ensure that the failure of any system element will not impact the operation of our platform and its services.

COMPUTE NODES

Each host has a double power supply, each one connected to a different electrical part of the data centre. All equipment that makes up the infrastructure has at least two high-availability network connections (LAG). Similarly, each network connection goes to a different switch so that a switch failure will not result in a drop in service. The RAM memory used by our hosts is ECC, which protects us against data corruption and potential failures.


We also have Hypervisors on N x 1.25, so that we have enough space to support even a failure of 25%. If a hypervisor fails, the servers hosted in it will automatically boot on other hypervisors.

STORAGE

Jotelulu offers high-availability storage that combines clustering based on cabinets with synchronous mirroring to provide a transparent recovery from failures.
With this redundant storage system we achieve:

  • Better protection against hardware, network or installation failures.
  • Eliminate inactivity times and change management times.
  • Update hardware and software without interrupting operations.

DATA NETWORK

We have various 10G circuits with different network providers for the data centre so that a problem with one provider will never affect connectivity.

The skeleton of the network within the data centre is made up of multi-chassis link aggregation. These links provide redundancy and scalability at the same time as preventing loops.

Each data centre has a pair of frontera routers that enable connection with the internet and other centres. After this, there are layer-3 aggregation switches, then layer-2 and then, lastly, access switches that the compute nodes connect to.

All logic switches are formed in pairs for redundancy and all devices are connected via multi-chassis link aggregation composed of two or more 10G or 40G connections. This avoids the risk of the formation of loops in layer 2.

Perimeter Security and Anti-DDoS

Jotelulu’s infrastructure features Anti-DDoS systems to prevent and filter denial-of-service attacks, keeping our servers always available.

The structure of our Anti-DDoS system consists of various layers of filtering and detection which allow us to screen and separate small attacks (from a few hundred Mbps) from larger attacks of thousands of Gbps.

IDS/IPS

Our Intrusion Detection System (IDS) allows us to detect unauthorised access to our infrastructure. It acts by assessing an intrusion when it takes place and generates an alarm. The IDS is accompanied by an attack prevention tool, known as IPS, that continuously and proactively traces suspicious or unusual network traffic.


The IDS/IPS cannot stop attacks on its own and needs additional tools, such as Firewalls, to help block intrusions.

FILTERING AND BLOCKING ON PERIMETER FIREWALLS

Our perimeter firewalls continuously analyse the traffic that reaches our data centres and blocks clearly malicious traffic so that it does not reach the data centre. They also review the volume of traffic to each machine in order to detect potential DDoS attacks.

SSD y NVMe (NetApp)

To ensure the greatest availability, at Jotelulu, we only use Solid State Disks (SSD and NVMes) from the top range (NetApp all-flash Cabinets).

Using this type of Enterprise disk aims to ensure:

THE BEST, MOST CONSISTENT PERFORMANCE

By using NetApp all-flash cabinets, we aim to ensure consistently excellent performance, regardless of the workload that the disk is subjected to or the level of usage.

DATA PROTECTION

The NetApp all-flash system provides an extra layer of protection to data in an integrated way. Synchronous replication, embedded encryption, WORM protection and multi-factor authentication are just some of the advantages that our storage cabinets have that help us to keep essential data available, protected and secure.

2-factor Authentication and Encrypted Data

When accessing and handling data, security is something that we take very seriously at Jotelulu. That is why we have implemented a powerful data-encryption system and 2-factor authentication processes.

2-FACTOR AUTHENTICATION

2-factor authentication is an access control measure whereby the user is provided access to the system only once they have presented two different proofs that they are who they say they are.

At Jotelulu, we have made access to the platform and the portal more secure by implementing 2-factor Authentication (2FA) through an access token generated on a mobile device. The generated token for this software is a six-digit number that the user needs to provide as well as their username and password to access Jotelulu’s services.

ENCRYPTED DATA

Encryption is a data encoding process that converts original data (plain text) into an alternative form known as encrypted text that only authorised parties can decode. Any person who does not have the correct keys will not be able to read the information.


Jotelulu services use different encryption systems when handling and transferring data to give an extra layer of protection against potential hacks.

24/7 Monitoring

Jotelulu has a 24/7 monitoring and alerts system that makes it possible to keep an eye on the system status at all times, both the main infrastructure and subsystems. This way, we can assure the reliability and stability of our platform and its services.

Our 24/7 monitoring system consists of a combination of metrics and graphs with the establishment of various rules and alerts. The ultimate goal is to be fully up to date and alert to potential problems to prevent any downtime.

Backup and Restore Policy

A backup is a copy of original data that is created in order to have a way of recovering the data if it is lost. Security copies are extremely useful in many different scenarios, and at Jotelulu, we have various backup policies for each of our services.

BACKUP POLICY FOR OUR REMOTE DESKTOP AND SERVERS SERVICES

The backup policy for our Remote Desktop and Servers services is based on snapshots (NetApp) in accordance with the following schedules:

  • Every hour [previous 5 hours]
  • Every day [previous 14 days at 00:10]
  • Every week [previous 8 weeks – Sundays at 00:15]
 
Additionally, users will be able to make manual security copies, either weekly (with maximum retention of up to 24 weeks) or monthly (with maximum retention of up to 24 months). These copies are made using the IaaS orchestration platform and are based on disk snapshots.
 
Restores using backups can be performed through the platform.
 
 
VSS (Volume Shadow Copy Service)
Shadow Copy is a technology that makes it possible to create security copies, snapshots of files or server volumes even when they are in use. This utility is only available by default for servers hosting the Remote Desktop service, on the C:\ volume.
By default, this is configured to create 2 copies per day and 7% of the volume is reserved for this purpose.

BACKUP POLICY FOR OUR FILE STORAGE SERVICE

The File Storage service has a pre-set backup policy for all users to create granular, encrypted backups.

The security copies policy is detailed below:

Backup Frequency: 1 copy daily

Retention of Backups:

  • Every hour [previous 5 hours]
  • Every day [previous 14 days at 00:10]
  • Every week [previous 8 weeks – Sundays at 00:15]

Furthermore, we use VSS volume snapshots that make it possible to restore previous versions of files and folders.

Scheduling of snapshots: Every day [12:00 and 18:00]

Retention of snapshots:

  • 64 snapshots.

Instantaneous and online data recovery system available for any user.

REPLICAS OF S3 BUCKETS

The object storage system replicates each object on 3 different disks located on 3 different servers. The established policy will keep one of the copies on a different data centre by default.


The S3 Buckets service also has a versioning function that can be activated through the subscription settings on the platform at any time. This way, it is possible to recover previous versions through the S3 protocol.

SLAs
Availability (A) = [(Hours in a month - Hours unavailable)/Hours in a month] x 100

The following are not considered when calculating system availability:

  • Causes outside of JOTELULU’s control or the result of force majeur.
  • Unavailability of the self-management panel.
  • Unavailability as a result of the failure of software hosted on virtual machines.
  • Viruses and IT attacks that may cause the total or partial loss of access to services.

Support service availability:

The platform has a support/engineering team dedicated to maintenance, renovation and resolving incidents available at the following times:

  • Critical incidents on the platform: 24/7 coverage.
  • All other incidents or requests: Monday to Friday from 08:30 a 20:00 [UTC/GMT +1].
 
Similarly, the Service Level Agreement (SLA) for the engineering/support team regarding response times for incidents or queries is as follows:
 
  • Critical incidents: Response within 1 hour.
  • Other incidents: Response within 4 hours.
  • Inquiries: Response time within 24 hours.

Fill out the form and one of our Sales team will contact you soon.

growth@jotelulu.com  |  jotelulu.com 

You can unsubscribe from these communications at any time. For more information,  check our Privacy Policy.

 

We make the difficult easy

Existing Disaster Recovery tools often require advanced knowledge to manage, demanding expertise that is difficult to acquire.

Jotelulu’s Disaster Recovery aims to make the difficult easy and offers a very simple deployment based on a three-step configuration:

Origin (Primary Site)
Determine the origin location of the subscription on which the Disaster Recovery service will be established.

Destination (Recovery Site)
Set the destination location (availability zone) where you want the Recovery Site to be deployed.

Replication characteristics
Specify the data related to the number of copies to be kept and the frequency at which the replication will be performed.