INFRASTRUCTURE AND SECURITY
Multiple infrastructure regions and availability zones hosted at maximum-security data centres. The infrastructure you’ve always dreamed of is now at your fingertips.
Our platform and data are hosted at highly efficient neutral data centres that boast the very best connectivity and security measures.
We only use cutting-edge centres in Europe and the Americas that are internationally recognised as leaders in technology and reliability.
At JOTELULU, our infrastructure is designed to include multiple layers of security to ensure reliability and proactively protect our cloud services. From system redundancy to advanced protection measures, our infrastructure guarantees business continuity for all our partners and customers.
We use efficient, high-security data centres strategically distributed across multiple regions to ensure an uninterrupted user experience. This global infrastructure allows our partners to bring their services closer to their customers while maintaining data residency and regulatory compliance, regardless of geographic location.
Our services use availability zones, which are physically separate locations within each region. These zones have independent power, cooling and network connections to ensure high availability and low-latency replication for critical applications. This design provides an unbeatable resilience against system failures and allows rapid and secure disaster recovery.
With JOTELULU, your cloud infrastructure is built on solid foundations that provide security, flexibility and world-class performance so you can adapt to your customers’ needs, wherever they are in the world.
Geographically distributed data centres allow our partners to reduce network latency and enable backups and failover with geographic redundancy.
When choosing the location of our data centres, we prioritise proximity to our partners to ensure minimum latency and optimum performance. The sites for our data centres are strategically chosen to mitigate risks such as flooding, extreme weather and seismic activity. Each availability zone is independent and physically isolated to guarantee resilience and protection against adverse situations.
Our data centres guarantee 99.999% availability for our customers’ services thanks to our agreements with the most recognised and reliable data centres in the world, such as Digital Realty and Data4. These partners operate latest-generation facilities designed to provide maximum security, redundancy and uninterrupted availability, which, in turn, enables JOTELULU to deliver extremely reliable services.
Our business partners’ investment in these global operations guarantees that our infrastructure is robust and well-managed, with constant supervision, advanced network and sustainable practices that enhance energy performance. These data centres operate 24 hours a day, 7 days a week, 365 days a year, ensuring that our customers’ critical needs are always covered.
Our infrastructure boasts multiple levels of redundancy and guarantee service continuity at all times. To minimise any interruption, we have redundant systems to protect critical facilities and ensure that data remains secure and accessible. Local redundancy at the disc level protects data within each region, while geographic redundancy extends this protection across various locations, improving data availability and security.
To ensure the reliability of our network connections, we use fibre optic links and redundant hardware to protect special components against potential failures. Furthermore, we use geographic replication to make sure that we always have a secure copy of data in alternative locations, maximising data durability and availability.
Data is synchronised regularly between different locations, while restore tests are performed regularly to validate the integrity of our backups.
At JOTELULU, we continuously monitor the use of our services to ensure that we meet our commitments in terms of availability and the requirements of our users.
Our capacity planning model regularly evaluates system demand and the use of our infrastructure, and we carry out monthly reviews to anticipate future needs. This approach means that we can proactively adjust resources, taking into considering key factors such as data processing, telecommunications and the secure storage of audit logs.
The data centres supporting JOTELULU’S infrastructure are powered by 24/7 uninterruptible power supplies (UPS) and emergency power systems, which include local generators to provide backup power. The UPS and generators are regularly tested and maintained to ensure that they are in full working order. In addition, we have contractual agreements with local suppliers for rapid emergency fuel deliveries where necessary. Our data centres also have dedicated operations centres that constantly monitor the power system, including critical electrical components.
Electrical redundancy is a fundamental way of guaranteeing availability, through use of multiple power sources and backup systems, such as generators and UPS. In the event of a power cut, the UPS system activates immediately to maintain a supply of power until the generators come online. The generators then ensure a continuous supply of power during prolonged power cuts, maintenance tasks or emergency situations, with fuel reserves available in the event of a natural disaster.
At JOTELULU, we are fully aware of the amount of electricity consumed by our data centres, and we are committed to sustainability through the use of renewable energy. This approach allows us to considerably reduce our environmental footprint by minimising the CO₂ emissions associated with our operations, further contributing to a cleaner and more responsible future.
Our Operations team implements energy efficiency strategies that cover all aspects from the design of each facility to 24/7 continuous monitoring. We monitor electricity consumption, cooling systems and shared infrastructure to optimise efficiency and guarantee that every aspect of our operations is as environmentally friendly as possible.
In addition, we take active steps to compensate the CO₂ emissions that we generate, whether produced by electrical generators or by the travel required for daily operations.
As part of our overall commitment, we also work with other companies in the sector as part of initiatives like the European Climate Pact. This EU-led initiative sets ambitious targets to decarbonise digital infrastructure and achieve climate neutrality by 2030. In line with these objectives, we prioritise the use of renewable energy to contribute towards the sustainability of the sector.
At JOTELULU, we guarantee the safety of our facilities using advanced fire detection and suppression systems connected to isolated power sources to ensure they are operational at all times. Strategically located water sensors monitor potential water ingress or leaks and notify staff immediately to prevent damage.
Our facilities are also fitted with advanced smoke detectors and double interlock sprinkler systems to protect critical equipment. Daily inspections and continuous monitoring ensure that all security requirements are rigorously adhered to.
Our leak detection systems are equipped with alarms for rapid response, ensuring that both fires and floods are managed efficiently to protect our infrastructure and customer data.
All access events and requests are logged and preserved as part of an electronic audit, enabling close control and the detection of anomalies to prevent unauthorised access. Our CCTV system monitors critical areas, such as entrances, cages, cabinets and perimeter areas, and recordings are kept for at least 90 days, unless otherwise required by law.
Physical access is continuously monitored by a security control team, supported by a CCTV system linked to the alarm system. Only authorised personnel can access our facilities and any equipment that enters or leaves the site is rigorously controlled. Any security events are logged in detail and analysed in order to devise corrective actions to strengthen security.
With CCTV and a 24/7 alarm system, JOTELULU guarantees maximum protection of its facilities and resources.
At JOTELULU, our infrastructure is the foundation on which all our cloud services are built. It has been designed to deliver exceptional performance and constant availability. Each element of our infrastructure has been carefully deployed to satisfy the needs of even our most demanding partners and ensure maximum protection and efficiency at all times.
JOTELULU’S internal network connects all key devices via high-speed links, ensuring rapid operations with no latency. Our spine-leaf architecture means there are multiple connection routes for each device, eliminating single-point failures and boosting network resilience. This means that, in the event of a device, failure, traffic will be automatically redirected to maintain service availability.
JOTELULU’S infrastructure features multiple layers of redundancy. This includes alternative connections, backup power systems and a fibre-optic backbone that connects all our regions. This architecture ensures that our partners have continuous access to their services, no matter what happens.
To cater for the changing needs of our partners, we use network virtualisation technologies, such as VXLAN. This allows us to create flexible and scalable logic networks that adapt rapidly to new demands and provide agile and efficient resource provisioning.
We combine core and edge routers to manage large volumes of traffic efficiently. Real-time monitoring systems allow us to anticipate potential problems and solve them before they affect our partners. This way, we can always guarantee the very best quality of service.
At JOTELULU we are committed to providing a network infrastructure that supports our partners’ growth by guaranteeing security, flexibility and unbeatable performance.
Our server infrastructure is configured to provide redundancy at the cluster level and ensure that service is maintained even in the event of a component failure. Each host has two power supplies, each of which is connected to a different segment of the distribution network without the data centre building, guaranteeing constant protection against power cuts. Furthermore, our equipment features multiple high-availability network connections (LAGs), each connected to an independent switch to ensure service continuity in the event that a switch fails.
Our servers boast exceptional processing power thanks to their latest-generation Intel processors that are optimised to handle complex workloads while ensuring maximum efficiency. These CPUs deliver high performance, low latency and improved computing capacity to guarantee that each process and application runs smoothly without interruptions.
Our servers have DDR5 ECC (Error-Correcting Code) memory, a latest-generation technology that ensures high performance levels and increased error-correction capabilities. This not only improves speed and energy efficiency but also helps prevent data corruption to guarantee a highly stable environment. With DDR5 ECC, we make sure that all operations are executed with maximum precision and security to minimise the risk of system failure.
Our infrastructure is designed to deliver a continuous, uninterrupted experience. We use hypervisors configured to ensure total redundancy. If one hypervisor fails, the virtual machines will be migrated and restart automatically on other active hypervisors. This approach guarantees that the service is always available and our partners’ operations are never compromised.
At JOTELULU, security is a top priority. That’s why our servers are always up to date with the latest security updates and are monitored constantly to detect and mitigate any anomaly or threat. We implement hardening and security techniques to minimise vulnerabilities and maintain a secure and reliable environment for our partners.
NetApp’s ONTAP operating system is at the heart of our data management system. This comprehensive platform provides a series of key benefits, including:
To guarantee data protection and availability, we create replicas on NetApp FAS or StorageGrid cabinets located in different geographic regions. This geographic distribution ensures that, in the event of an incident at one location, data will remain accessible from the other, thereby minimising the risk of data loss.
Data security is a top priority for us. NetApp provides robust solutions to protect against ransomware attacks. Using Snapshot technology, read-only copies of data are made which cannot be modified by ransomware. Furthermore, tools like FPolicy allow us to monitor and block suspicious activity in real time, offering an additional layer of protection.
Our perimeter firewalls are designed to block unauthorised access and filter traffic according to defined security policies. This establishes an initial barrier of protection against potential threats. These advanced solutions analyse and control each packet of data that crosses our network, ensuring that only legitimate traffic can access our services and resources.
To protect our networks even further, we use IDS/IPS systems that constantly monitor traffic for suspicious activity or attack patterns. These systems not only detect potential intrusions but also act in real time to mitigate threats that could compromise security. By identifying and blocking abnormal activity, we ensure that our infrastructure and our partners’ data is always protected.
Denial of Service attacks (DDoS) are an increasingly common threat for cloud operations. Our Anti-DDoS solution is designed to automatically identify and mitigate this type of attack. This helps to guarantee that services remain available without interruption, even when faced with massive attempts to saturate the network. This additional layer of protection ensures that legitimate traffic can flow unhindered while blocking any attempt to compromise availability.
Our perimeter security strategy is based on layered protection, combining multiple technologies and tools to provide a secure, reliable environment that adapts to the needs of our partners. From traffic analysis to threat detection and automatic blocking, each element of our infrastructure works in synthesis to provide a comprehensive defence against threats from insecure networks like the internet.
The JOTELULU platform is designed to provide a secure and reliable environment that protects the integrity and availability of services. Our platform security combines advanced technologies, such as encrypted connections, multi-factor authentication, granular access permissions and constant 24/7 monitoring, so that our partners can operate with complete peace of mind that their data and operations are always secure.
Access security is essential for the JOTELULU platform. That’s why we have implemented two-factor authentication (2FA). This method requires users to provide two forms of identification to access the platform. Authentication is performed using a temporary access token generated on a mobile device, which must be entered along with a username and password. This process minimises the risk of unauthorised access and strengthens protection against phishing scams and other attacks.
Our platform makes it possible to set granular roles and permissions, providing partners absolute control over who can access their services and what they can do. This flexible access management system ensures that only authorised users can perform specific actions. In addition, we provide an event logging system so that a record of every action or change is maintained to provide real-time transparency and audit capacity.
Data encryption is one of the main layers of security that we use to protect our partners’ sensitive information. The JOTELULU platform converts data into encrypted text using advanced encryption processes, ensuring that only authorised parties can de-encrypt and access information. Any attempt to access data without the correct encryption keys will be useless, protecting it against unauthorised access and external attacks.
To ensure that we provide a stable and reliable service, we have a 24/7 monitoring and alert system that constantly monitors our infrastructure, including subsystems, compiling metrics, processing data in real time and checking service status. Constant monitoring means we can identify potential risks or malfunctions before they become an issue, thereby minimising downtime and guaranteeing a smooth, reliable service experience for our users.
Remote Desktop has been designed to ensure that it is a secure, reliable remote-working solution. Its security features cover multiple layers to guarantee that each connection and operation is protected against external threats and risks.
The service is protected by an advanced perimeter security infrastructure that monitors and controls inbound and outbound traffic. This specific protection measure for Remote Desktop includes firewalls, Intrusion Detection Systems (IDS/IPS) and anti-DDoS measures to ensure that only secure traffic reaches our platform, further reducing exposure to cyberattacks.
To ensure uninterrupted service, Remote Desktop operates on a multi-server infrastructure that guarantees high availability. This means that in the event of a server failure, the service is automatically re-directed to another available server, ensuring that our partners’ operations are unaffected.
Communications and data transfers are performed using SSL (Secure Sockets Layer) encryption, providing an additional level of protection and ensuring that data sent cannot be intercepted or manipulated. This approach guarantees data confidentiality in communications between the user and the platform.
To guarantee a secure environment, Remote Desktop uses specific restrictions for applications distributed through RemoteApp. This makes it possible to isolate each application and prevent it from interfering with other processes and services, further minimising the risk of exposing sensitive data.
Access to Remote Desktop is protected using a two-factor authentication system (2FA). This guarantees that only authorised users can access the environment by including an additional layer of security that requires a temporary access token, as well as a username and password.
Remote Desktop uses a backup system with a fixed schedule to guarantee data protection:
Our Remote Desktop service also uses VSS (Volume Shadow Copy Service) technology to create snapshots of files or volumes on the server, even when they are in use. This provides additional protection for the server’s C drive, with two daily backups by default and 7% of the volume reserved for this purpose. Providing a robust and efficient backup layer, VSS guarantees that data is protected with no interruption to operations.
Every JOTELULU network includes a dedicated virtual firewall that allows the user to apply personalised security rules, including IP filtering and Geo-IP capacity to restrict traffic based on country of origin. This feature allows precise control depending on the needs of each environment and provides robust protection against external threats.
Our infrastructure allows secure VPN connections with support for Site-to-Site IPSec connections and Remote Access. This ensures that communications between different sites or users are always protected through encrypted tunnels. In addition, we use private networks that are fully isolated to guarantee that only authorised users can access resources.
This feature operates as an efficient mechanism to distribute traffic between multiple virtual servers. It not only improves performance when handling large volumes of requests but also adds an additional security layer by controlling and filtering access, ensuring that traffic is managed in a secure and uninterrupted way.
The physical servers that host this service have N+1 redundancy to guarantee that there is always additional capacity to absorb the load in the event of a server failure. This ensures service continuity with no interruptions, even when the unexpected happens.
Our servers are protected using snapshots (NetApp) according to the following schedule to guarantee rapid data recovery:
This combination of perimeter security, isolated networks, load balancing, N+1 redundancy and backup policies ensures that JOTELULU server environments are secure, reliable and ready for any situation.
The JOTELULU File Storage service is designed to provide a secure, flexible and efficient data-handling solution, supported by the most advanced access control and protection measures. Our architecture guarantees that every file is protected at all times and that access to data is secure and monitored at all times.
All data stored using the File Storage service is encrypted according to advanced security standards. This approach ensures that only authorised parties can access information and provides an additional layer of protection against potential attacks.
Access control and security are essential for secure data management. Our solution allows partners to set custom permissions at the user and group level. This ensures that users only have access to the files and folders they need. This not only improves security but also makes data management and access security easier to control.
The File Storage service provides the possibility of sharing documents with third parties securely over the internet. Shared documents can be protected with a password and an expiration date, ensuring that information is only accessible for the desired time period and is subject to strict security measures.
To guarantee data integrity and availability, the JOTELULU File Storage service has a backup policy based on snapshots (NetApp) that adheres to the following schedule:
JOTELULU’s Object Storage, based on the S3 protocol, is a secure, scalable and reliable solution for handling large volumes of data. With a focus on security and availability, Object Storage offers multiple features to guarantee protection and accessibility for every object stored.
All objects stored are protected using advanced encryption. This guarantees that all data is encrypted, both in storage and when sent, ensuring confidentiality and protecting information against unauthorised access.
Our high-availability infrastructure is geographically distributed to ensure that data is always available and protected against local failures or interruptions. With this approach, our service delivers optimum performance and is resilient against potential incidents.
Each object stored in the Object Storage system is replicated on three different discs on three different servers. Our default policy ensures that at least one copy is kept at a different data centre, providing redundancy and protection against potential hardware failures or problems in a specific location.
Our service includes a versioning feature that can be activated from the subscription page on the platform. This allows the user to recover previous versions of objects and offers an additional layer of protection against undesired changes, losses or accidental modifications.
This feature allows our partners to configure granular permissions for each object or set of objects. This guarantees that only authorised users can access, modify and manage data, providing precise and secure access control.
The security we have implemented for our services includes perimeter protection measures that monitor and control inbound and outbound traffic. This guarantees that only authorised parties can access and interact with our system and adds an additional layer of defence against potential external threats.
Data protection and regulatory compliance are essential for JOTELULU. Our infrastructure and services are aligned with the main international regulations and certifications to ensure that all our data is managed according to the strictest standards.
If you need to check our complete Information Security Policy, you can do so through this link.
The Shared Responsibility model is a fundamental framework for managing how cloud services work. Based on this model, the level of responsibility for each party will vary depending on whether the product is Infrastructure as a Service (IaaS), Platform as a Service (PaaS) or Software as a Service (SaaS).
For JOTELULU products that provide infrastructure services (Servers), responsibilities are shared in the following manner:
For JOTELULU products that are Platform as a Service (Remote Desktop), responsibility is shared as shown below (for some elements, like the operating system, responsibility is shared):
For JOTELULU products that function as software (File Storage, Object Storage, Virtual PBX), responsibility is shared as follows: