TIER Classification: learn about its importance for Data Centers

What do you take into account when hiring a data center service for your business? If TIER Classification is at the top of your list, you can be sure it will be a great investment.

After all, interconnection between resources and digital environments is one of the requirements for companies seeking success. A robust and available data infrastructure which ensures information security and high performance is crucial.

However, the search for a data center provider that delivers that has to look beyond cost. The company must follow rigorous international standards, capable of validating and measuring its quality of service.

And this is exactly what TIER Classification provides, a label that lets your company know exactly what the provider can deliver. So, before investing in a data center, it’s essential to understand more about TIER Classification. This content covers everything on the topic. Ready to learn more?

TIER Classification: what is it?

TIER Classification is a type of certification that aims to validate the performance and reliability of data center infrastructures. It’s a system created more than 25 years ago and still being currently applied by the Uptime Institute.

The set of guidelines (ANSI/TIA/EIA-942) defines mechanical, electrical, architectural, and communication parameters for the optimal performance of data centers.

The TIER classification is independent of size, and rates aspects such as availability and performance to help companies direct their investments. Thus, once you know the TIER classification of providers, you can have a quick idea of what they can deliver — that is, whether or not they are able to meet your demands.

It’s worth mentioning that “tier” is a word with English origins, meaning “layer” or “level.” Thus, the TIER Classification has different levels of certification: TIER I, TIER II, TIER III, and TIER IV.

Uptime Institute lists some of the most critical points to be assessed:

Performance based: the project must meet the requirements of availability, redundancy, and fault tolerance.

Technology Neutral: the TIER Classification does not require or rely upon standard technologies, remaining open to innovation.

Supplier independence: there is no relationship or dependency between the institute and suppliers.

Flexible: the company is free to comply with local guidelines.

Life cycle: certification seeks to validate all data center requirements.

Certification: certification is independent, provided by expert engineers.

Naturally, the higher the TIER, the more robust the data center infrastructure.

How the TIER classification system works

Only the Uptime Institute can be consulted for a TIER Classification, and it is the only institution authorized to issue certificates. Therefore, there are very strict controls in place, based on international guidelines and standards.

There is no specific regulatory standard applicable to TIER Classification in Brazil, but the system is used together with some other regulations (such as NBR 5410, NBR 15247, NBR 27002, and NBR 11515).

TIER I

TIER I is the simplest of the Classification levels.

Here, the company is certified to operate servers that follow basic compliance criteria, with no redundant components. It has an air conditioning system, as well as electrical distribution subsystems.

At TIER I, the infrastructure has availability to process about 99.671% of applications. It faces up to 28.8 hours of downtime per year. In addition, it must be completely shut down annually once a year for preventive and corrective maintenance.

TIER II

TIER II automatically meets the above requirements.

It’s worth mentioning that this is a certificate that validates the presence of a partially redundant infrastructure. It’s more aimed at small businesses, whose infrastructure does not work beyond business hours — and does not need online support.

At TIER II, the annual availability is about 99.749%. Thus, there can be up to 22 hours of downtime each year.

TIER III

In addition to fulfilling all the requirements of the levels above, TIER III is totally redundant.

It’s the ideal choice for modern companies that operate at all times and need constant support for their technological tools and automation solutions. Tolerated downtime is only 1.6 hours each year, because its availability must be at 99.98%.

One detail is that TIER III infrastructures cannot be located beyond a 1-mile radius from airports.

TIER IV

TIER IV is the last classification (which also meets all previous requirements). Its main characteristic is robustness: it continues to operate even if its system or one of its elements fail.

In addition to redundancy, there must be several electrical systems and subsystems operating simultaneously. It’s fitting for multinational companies, with operations that require uninterrupted care.

An example of organizations that would be interested in this Tier are the large credit card operators.

Its availability must be 99.999%, and tolerated downtime is only 26 minutes each year.

Ascenty Data Centers: Tier III classification at your disposal

Throughout Latin America, not only in Brazil, companies are increasingly looking for reliable providers. In order to make sure that your data center investment will pay off, you need robust technology to ensure availability and quality.

That is why Ascenty has worked hard to earn its TIER III classification. That’s right: the infrastructure of Latin America’s largest data center company also meets the leading quality requirements.

According to the Uptime Institute, Ascenty offers 99.982% availability at its data centers.

However, internally, the company guarantees 100% for infrastructure. There are multiple and independent distribution paths to the IT equipment.

In addition, the IT equipment is dual-fed, compatible with the site topology. The construction quality of Ascenty’s data centers is impressive, as the company aims to stand out from its competitors.

The goal is to offer cutting-edge solutions, ensuring high levels of connectivity and interconnection. As a result, your business will grow supported by high-quality resources, tools and infrastructure.

Why not find out how Ascenty can help your company to establish the best data and connection infrastructure? Talk to one of our experts!

PCI DSS certification: why it’s important for the financial sector

Nowadays, protecting data is a must for any company. A necessity that becomes greater every day. In some areas such as the financial sector, this is even more relevant. After all, the data and information are sensitive and extremely important. To ensure this high level of protection is why PCI DSS Certification exists.

Are you familiar with this certification?

For the financial sector, it’s essential on several levels: it involves and aligns all those involved in the transit of banking data. In other words, every company that acts as an intermediary between consumers and their purchases, whether in person or online.

Today, the PCI DSS Certification is uniquely important around the world. How about understanding more about it, its requirements, and its importance? Keep reading!

PCI DSS Certification: what is it?

The PCI DSS (Payment Card Industry – Data Security Standard) Certification is an industry standard for securing credit card use. Thus, PCI DSS Certification is nothing more than an international guideline which aims to establish good practices and standardized rules for card transactions.

It’s a security standard that must be followed and submitted to audits from time to time. The PDI CSS Certification is applicable in both in person and digital payment situations.

This certification was developed by the Payment Card Industry Security Standards Council, a kind of association of giant operators (such as Mastercard, Visa, American Express, and other companies).

The aim is to assess security conditions and establish a minimally safe ground for your cards (and therefore your clients’ data) to be used.

What are the requirements for a company to obtain the PCI DSS certification?

The PCI DSS Certification has some predefined requirements to establish the Payment Card Industry Data Security Standard. There are 12 requirements, divided into 6 objectives. Check the table:

These requirements are applicable on a very broad scale within the financial industry. Thus, all companies involved in the processing of credit card data must follow these standards.

Want to know in which sectors these companies work? Take a look:

The latter are included because they can be involved in the process of transmitting, processing or storing a credit card number during business transactions. Therefore, for the correct credit card number processing to happen, these requirements must be followed!

The importance of having a PCI DSS certified partner

For e-commerce platforms, identifying a PCI DSS Certification is the first step towards looking for a good payment processor. This set of requirements constitutes a basic (and expected) layer of security that all commerce and stores rely on. It’s the minimum to ensure safe sales and tranquility for consumers.

If your company works in the financial sector, in any of the layers involved in such process, having PCI DSS certified partners is a great guarantee. However, the certification being popular doesn’t mean it’s always followed. And this can lead to a series of problems and suspicions.

In fact, Verizon’s “2020 Payment Security Report” study collected some alarming data. About only 27.8% of companies were able to maintain compliance with PCI DSS Certification guidelines in 2020. That’s a drop of 8.8% when compared to 2019.

In other words, a clear sign that many companies have yet to align themselves with current required security guidelines. This may express that, among other things, these companies are not following other guidelines, such as LGPD itself.

However, your company knows: with partners who are not committed to the safety of your data, it’s hard to grow and expand. So, when it comes to choosing a company, look for a PCI DSS Certified partner!

Ascenty, the largest data center company in Latin America, is PCI DSS certified!

With its wide infrastructure, it serves the big players of the financial market. The demand level is high and the need for security when each transaction is performed is extremely high. That is why the company invests in shielding, so that its clients can operate peacefully.

Want to know more about how Ascenty can help your company stand out and grow — with maximum security? Talk to one of our experts!

Cloud Vendor Lock In: what is it and how to avoid it?

This is an undisputed truth: cloud  computing has taken the market by storm. Its benefits are, besides offering financial relief to companies, a way to boost their business performance. More security and agility in the digital world. However, some providers may deviate from this path and offer a service that the client, i.e. your company, cannot escape — Cloud Vendor Lock In.

Therefore, it’s important that organizations study and prepare to avoid being trapped in a contract.

At times when flexibility – something that Multicloud offers – is key to being competitive, it’s essential that your company understands everything about the subject, avoiding possible great losses in the case of a service migration.

In this content, we will explore a bit more about Cloud Vendor Lock In, its drawbacks, how to avoid it, and also an incredible tip on how to take advantage of an entire cloud infrastructure without the risk of a Cloud Vendor Lock In.

Learn more ahead!

Cloud Vendor Lock In: what is it?


Today, the SaaS (Software as a Service) market is huge. According to a Gartner study, this segment alone is expected to be worth more than US$151 billion by 2022. As Sid Nag, VP of Research at Gartner, states in the study, “at this point, adopting cloud computing is par for the course.”

That means that if any company is not already on the cloud, it must be in a hurry to migrate to it.

The problem is that, in some cases, the promise of freedom and flexibility for your company to grow in a scalable and organic manner is not fulfilled. And so, some providers started to “lock” their clients into contractual clauses and development requirements that prevented them from migrating to another server.

Imagine the following scenario:

Company A hired SaaS from Provider X. Upon reaching a certain period of its journey, Company A identified the need to migrate its operation (or part of it) to Provider Y, which better fits its demands.

However, due to contractual impediments — which make this operation expensive and technically complex — Company A is helpless and unable to migrate its workload.

That is Cloud Vendor Lock In.

Besides SaaS, it can occur when contracting PaaS (Platform as a Service), in which the client develops its own applications — and that can represent another impediment for migration.

For these providers, Cloud Vendor Lock In can be justified as a way to retain clients in their solution environment. However, the practice does not take into account the clients’ own need to make their operations more flexible and improve deliveries. Sometimes, a provider’s capacity does not meet the client’s needs.

Therefore, once a provider has implemented the Cloud Vendor Lock In, performing necessary migrations becomes very costly for the client.

Besides the financial impact, these restrictions also hinder future migrations and integration of applications — due to the development characteristics of each PaaS.

How to avoid Cloud Vendor Lock In 

So, how can this problem be solved? The good news is that Cloud Vendor Lock In is not an industry standard. It can be avoided, even if it requires some commitment to studying certain issues.

To make it easier, we have listed some key considerations. Ready to escape Cloud Vendor Lock In? Check below:

Escape Cloud Vendor Lock In at all costs


Sounds obvious, right? Nevertheless, it’s the first step of the journey.

Check your provider’s flexibility: can you move your app to other clouds, or migrate the service from another provider, if necessary? If not, does the provider set conditions under which this is possible (such as faults)?

Also, if you need to build apps that require complex customization, make sure you have a backup plan. Even better, if you can afford it, is to have an alternative cloud to run your code as a backup.

Get to know the different PaaS


One alternative is to split the risk. That is, use resources from multiple PaaS providers.

If they are not dependent on a single cloud to deliver their applications and businesses, you can set out to explore the options of the PaaS you control.

This requires some genuine interest, so ask your providers questions and try to understand how the PaaS runs and how your risk management is set up (especially in the case of a large centralizing cloud).

Ask questions about redundancy and the system architecture


Try to fully understand your software architecture and system redundancy with the help of your cloud provider. This comprehension will give you more autonomy when negotiating with the provider.

A good look at the architecture diagrams of the cloud environment can provide in-depth information about system reliability — and whether or not it’s possible to escape Cloud Vendor Lock In.

Ascenty ACCX: a powerful ally against Cloud Vendor Lock In


Ascenty’s ACCX, part of Cloud Connect, is a turnkey solution for companies searching for this exact flexibility between service providers and cloud platforms.

Cloud Vendor Lock In: o que é e como evitá-lo?

Ascenty Cloud Connectivity Exchange is a solution that integrates different distributed data environments in several public clouds (AWS, Oracle Cloud, Microsoft Azure, Google Cloud and IBM Cloud) to a single platform, integrated with your data network (IP/MPLS).

It’s an ecosystem that integrates the environment of multiple layer-3 public clouds into your infrastructure.

This way, you have full integration potential of IaaS, PaaS, and SaaS solutions. With ACCX, clients reallocate their workload to the public cloud that best meets their demand according to their strategy, besides creating an easier network integration with their private structure.

The platform enables interconnection between Cloud Providers, guaranteeing simplified migration or simply ensuring that through low latency interconnection there can be interdependencies between applications and clouds, so you have gains in time, in availability and can take advantage of full interoperability of different public clouds at a fair price.

Cloud Vendor Lock In can be an issue for your company. Therefore, it’s ideal to choose a partnership that eliminates these risks, enabling the free use of the cloud resources that your business requires.

So, talk to Ascenty and understand how ACCX can serve your organization today!

Why choose a Carrier Neutral data center?

The increasing use of the internet, and the resulting exponential growth in digital data ultimately led to an upsurge in the number of data centers to meet the demands of companies of all sizes and segments.

However, there are two types of data centers in the market: Carrier Neutral and Carrier Specific.

 Carrier Neutral data centers allow access and interconnection to several different carriers, offering optimal services to your business. Carrier Specific data centers, on the other hand, only work with a single carrier, which controls all access to corporate data. This might not be the ideal choice.

After clarifying this important difference between them, in this article we have listed the main advantages to take into account when choosing a Carrier Neutral data center over a Carrier Specific one for your organization. Check it out!

Carrier Neutral Data Center: What is it?            

A Carrier Neutral data center – or simply “neutral” – enables interconnection between several different telecommunications carriers and the colocation solution provider.

 Even if some of the data centers are owned and operated by ISPs (Internet Service Providers), Carrier Neutral data centers are operated by third parties (usually by the colocation solution supplier), which has little or no part in providing internet access services.

That is what makes the Carrier Neutral data center a more interesting choice compared to Carrier Specific. They promote competition and diversity, since a service located in a colocation can have a single or multiple providers, or even connect only to the head office of the company that owns the server, for example. 

Another major hosting benefit in Carrier Neutral data centers is the ability to change the internet provider as needed without having to physically move the server elsewhere.

We have also listed 4 other main benefits of the Carrier Neutral Data Center solution. Check them out below.

Benefits of a Carrier Neutral Data Center for your business:

1.       Free to use any carrier

 Colocation data center solutions offer a high level of control and scalability, reducing the need for developing new projects when your company’s demand increases or decreases.

 In addition, the neutrality aspect further expands this opportunity to save. Since companies are free to use any carrier in a Carrier Neutral data center, they can choose the one that offers the best contract. That is, the one that meets their needs with the best cost-to-benefit ratio.

2.   Competitive edge: scalability and flexibility

 The flexibility to quickly shift your data management strategy is yet an other advantage of the colocation solution.

The Carrier Neutral model is essential to those looking to expand their business. All it takes is a few commands in an interface or a call to the colocation central to increase or decrease the network transmission capacity.

All of this scalability and flexibility represent another important edge in such a fiercely competitive market.

And this element is very important for organizations working with processes using data that require immediate access any time of the day, regardless of the size of information flow and client needs, for example.

 3.   More freedom for your business

 Making changes in case of an emergency is much easier when you have several options available, right? The flexibility of being able to use different carriers based on your data center is also a unique benefit of neutral alternatives.

This is a benefit you can’t find in Carrier Specific data centers.

Since Carrier Neutral data centers do not belong to any specific carrier, this also means greater resilience when it comes to accessing your company’s data.

 4.   Local and regional redundancy

 Carrier Neutral data centers offer local and regional redundancy. But what does that mean?

Basically, the term means duplicating the information stored in these data centers.

The goal is to ensure your data can still be accessed even after hardware failures, damages and even natural disasters at the head office of the colocation solution provider, for example.

This benefit grants neutral data center users all of the options they need to protect their significant investments in virtual infrastructure and data, even when facing a serious setback.

Working with carrier neutral data centers clearly offers a wide range of benefits to your organization. Ascenty offers Carrier Neutral data centers for your company to use its network or define a provider that best meets its needs.

Contact our experts to learn what your company stands to gain by switching to Carrier Neutral data centers.

Read More

NAP benefits for corporations

Connectivity is a key element for companies to thrive in today’s marketplace. The vast supply of services, on the other hand, muddles the limitation of several connectivity resources. This prevents corporations from accessing 100% of the information, which ultimately affects their business. However, there is a concept that can change all of this: NAP. Learn more about its benefits here.

The NAP concept

NAP stands for Network Access Point. One or multiple points with high connectivity potential and access to main Carriers, providers and contents worldwide.

One of the main benefits of the NAP is that ISPs connect their POPs (Point of Presence) to it, in order to interconnect with the main services and contents. This allows companies to access any local and global resource via the NAP connection.

In other words, the NAP enables corporations to transcend barriers and frontiers, connecting to a world of new possibilities.

In simple terms, the NAP makes it easier to access information, allowing companies to break free from the limitations of their countries or geographical regions, besides accessing a wide range of international connections.

ROI in Colocation: the full rundown

NAP benefits: what companies stand to gain

Modernization and coverage are the main keywords.

The NAP offers several benefits in general. There is a wide range of different options that add value to companies that contract this service. However, all of them focus on modernizing and expanding the reach of your business.

NAP enables the development of your IT sector, adopting multicloud environments or even hybrid environments much easier and more efficiently.

This service allows you to interconnect your environments to as many vendors and partners you need.

That is why this resource fuels companies that seek to scale their own business through major changes in their network infrastructure. The NAP also helps maintain maximum efficiency in your production routine, guaranteeing an available and very low-latency connection.

It includes resources such as Golden Jumper or Cross Connect to bolster your strategic execution, connecting your company to the entire world.

This means a company based in Brazil can use all of the structure and applications of carriers operating in Europe, North America, Africa and many other locations!

The NAP’s benefits are even better for companies that rely on international connections to carry out their business activities. The NAP gives your company a powerful connection with much lower operational costs.

Having an NAP is crucial for companies seeking to update their network and maximize the coverage of their operations.

The differential of NAP at Ascenty

It’s one thing to use an ordinary NAP service, but nothing compared to Ascenty’s NAP.

Ascenty’s data centers feature countless international carriers. That is why the company can take its clients to wherever they need to go.

Ascenty’s NAP is an interconnection point that allows clients to reach content and information anywhere in the world.

How is this possible?

In Ascenty’s design, fiber-optic cables are connected to the Submarine Cable Landing Stations in Praia Grande (state of São Paulo). That is where the first and main connection points of submarine fibers of major international carriers are located.

Instead of simply creating a routing point for the signal of these international carriers within Ascenty, we take one step further and ensure optimal transport between the submarine stations and the Data Center, through the fiber-optic network itself.

This ensures an extremely high-quality connection with very low latency and international coverage, allowing clients to access and use countless resources from several different carriers.

By contracting any carrier (with a connectivity point at Ascenty), your company already has access to the benefits of Ascenty’s NAP. Simply request a link for the carrier to make a cross-connect and bring your company to Ascenty’s NAP. All of that without even having to contract a Rack or data center at Ascenty.

After all, Ascenty strives to meet each and every one of your business needs, delivering custom services to help solve your problems and ensure scalable growth for your company.

Besides, it is important to point out that all of Ascenty’s data centers are connected to the NAP. That means that all clients have full access to the entire ecosystem of connectivity and solutions.

Enhance the quality of your connection, securing your data and expanding access to information around the world – schedule a meeting with our experts and let us guide your company through this modernization process!

Read More

9 cybersecurity tips for companies adopting remote work

Remote work, which seemed distant to some companies before the Covid-19 pandemic, is now part of the daily life of many. What was supposed to be an emergency solution will likely have a lasting impact on how people work. This is what a study by professor André Miceli, ofFundação Getúlio Vargas (FGV), points out, concluding that the format should grow about 30% when activities return to normal. In this scenario, in which online operations are increasingly present, one of the actions that should be prioritized is the cybersecurity of systems and applications.

To have an idea of the current dimension of cybercrimes, data from Fortinet Threat Intelligence Latin America show that, in the month of March alone, when the coronavirus pandemic led to social isolation mandates, there were approximately 600 new phishing campaigns per day in most countries. The attacks occur through malicious links, which lead the user to provide personal data on fake pages or download files through illegal software. The goal is to control devices and steal information.

This situation is aggravated by professionals working remotely using their home networks. But that’s not where the problems end. There are several other types of virtual attacks that can compromise operations and cause millions in losses for companies. Therefore, it’s essential to protect yourself.

Cybersecurity: 9 valuable tips for enterprise information security

As mentioned above, organizations can suffer from numerous cyber attacks that are facilitated by remote work, such as spyware, ransomware, hijack, and DDoS. Thinking of helping to ensure the security of their data and applications, we have compiled a list of 9 things you should do to promote cybersecurity both now and in the future :

1. Creating policies and raising employee awareness

The first steps to guarantee that information security measures are successful are to establish clear policies and make employees aware of the importance of following them. In addition, you need to continuously train the teams about the threats that can hinder processes and what precautions to take to protect themselves from each of them, as well as to clearly and directly show how harmful cyber threats can be for employees and company.

2. Investing in cryptography

Cryptography solutions for e-mails and files can significantly help with cybersecurity. The benefit is that their implementation is simplified and does not depend on high investments by companies. For those who don’t know, the practice refers to building and analyzing protocols that prevent malicious users from reading private messages.

3. Installing a VPN

Installing a Virtual Private Network (VPN) which, as the name implies, creates communication networks between computers and devices with restricted access, is also a good strategy for protecting data during remote work. To do that, you can use the infrastructure that already exists in operating systems or open solutions.

4. Using authentication solutions

The two-factor or two-step authentication consists of the user entering a password, followed by a code provided through SMS, tokens, or other resources. Because the codes change constantly, cybercriminals cannot gain access to systems and data.

5. Installing good antivirus software

While working from home, many employees use their own computer and other devices to work. Therefore, they should be encouraged to install antivirus software as well as monitor antivirus updates and new subscriptions to ensure that their systems are operating properly.

Although these systems do not guarantee absolute protection against cybercrime, they already prevent a good deal of attacks, and may even notify you of the presence of suspicious activities such as malware, trojan viruses, worms, and possible changes to the registry and file system of operating systems, for example.

6. Implementing tracking software

Another situation that can compromise the cybersecurity of organizations is the loss or theft of devices provided to employees. To avoid this type of situation, installing tracking tools that locate each device and delete the data remotely is advisable.

7. Creating backups

Even with remote work, maintaining the backup routine (safety copies) to minimize unforeseen events is important. An interesting alternative for companies is to invest in hiring cloud data centers, which ensure efficiency and protection and facilitate remote access to their data.

8. Keeping systems and software up-to-date

Another action that must be taken to promote cybersecurity in companies is to keep operating systems and software up to date. This is because many updates already bring security improvements, as well as new tools and functionalities that can make the corporate day-to-day easier.

9. Watch out for criminals posing as colleagues

Individuals working at home should be extra careful about cybercriminals who may pose as co-workers. They may take advantage of employees, access the professional network of contacts and thus request details about the operation or confidential data, negatively affecting the company, both in terms of business continuity and financial loss.

It’s also worth noting that, along with the practices that optimize the organization’s cybersecurity, preserving the physical integrity of machines and devices used for work is necessary. To this end, professionals should always keep the equipment stored in safe places, even when indoors.

Even though at this moment the contact between people is restricted, minimizing the movement of strangers at home can avoid damage that could take time or cost the company.

Moreover, it’s important that the IT teams take human error into account when implementing cybersecurity solutions. The reason is that, no matter how much training helps in assertive conduct, one is never completely free from criminal acts.

With these measures, your organization can enjoy all the conveniences of remote work, while at the same time having the necessary protection of data and applications.

So, do you like our tips? Want to know more about how we can help your company to increase the level of cybersecurity? Get in touch with one of our consultants.

NAP (Network Access Point): What is it and how can it help you?

Have you ever wondered how corporate connectivity details impact network performance and business strategy?

The truth is that many people don’t know which factors can affect their connectivity. For companies, understanding these concepts is essential – and especially when it comes to NAP (Network Access Point).

After all, the Internet that supplies your business network (usually) does not leave the provider (ISP) to connect directly to your company.

In fact, there are several variables along this path. Everything depends not only on the geographic possibilities of the place, but also on what companies that provide the service and which technologies they use.

NAP (Network Access Point) is a great solution that telecommunications companies have found to allow their customers to make successful connections, expanding their reach without losing internet connection quality.

But how does that affect internet connectivity for organizations?

Having a NAP (Network Access Point) location increases the variety and performance of your connections and improves the interconnection with your Data Centers, as is the case with Ascenty customers.

However, before you start, you should have a firm grasp of this concept and what benefits it brings to businesses. Keep reading to learn more about NAP!

NAP (Network Access Point): What is it and how does it work?
NAP (Network Access Point) is one or more locations with a high level of connectivity and several options to access the main carriers and content. In it, different providers (ISPs) and telecommunications companies set up their POPs (Points of Presence), allowing any business to easily use their connectivity services.

The interconnection between these lines and companies allows customers to reach any location on the globe through the connections provided by the NAP.

What are the characteristics of an NAP (Network Access Point)?

Carrier Neutral;
Easy and cheap acquisition of Cross Connection or Golden Jumper;
Several national and international carriers available;
Traffic exchange points (IX.br);
Content providers;
Leading Cloud Service Providers available (Amazon, Microsoft, Oracle, Google, IBM Cloud). 
Why does your company need an NAP (Network Access Point)?


Any company whose strategy includes developing a regional and global reach, vertical growth for IT environments, adopting hybrid environments, multicloud environments or even interconnecting its environments with multiple suppliers, partners or service providers must be part of an NAP (Network Access Point). After all, it’s the ideal place for them to reach their connectivity and growth targets quickly and easily.

Because it’s a point with several connectivity options, it also offers extreme flexibility to adapt to each company’s strategy. In other words, companies that originally needed to connect with North America and adjusted their strategy to start doing business with Europe can easily acquire connections within the NAP, often acquiring a Cross Connect or Golden Jumper to plug into carriers that serve this region.

By itself, this characteristic of the NAP considerably increases the quality and variety of the connection as a whole. NAPs are usually also recognized for the high volume of information transferred and the large number of companies that are part of this location.

It’s the perfect solution for anyone paying too much for their internet connection, international connections or interconnection. NAP lowers costs and offers a powerful, low-latency connection.

In addition, the interconnection environment promotes an ecosystem where corporate networks not only remain stable, but are scaled. And that takes much more than just connectivity – you also need full-time availability, which the NAP (Network Service Point) provides.

In general, the NAP (Network Access Point) is the ultimate solution for companies looking for a high level of connectivity quality standards.

Benefits of the Ascenty NAP


Ascenty is setting up an NAP (Network Access Point) in São Paulo to enhance its customers’ connection.

This point will also offer an interconnection with the company’s entire ecosystem, enabling customers of any Ascenty Data Center to leverage its benefits to improve their connectivity.

This is possible because the company does not require its customers to set up physical POPs within the Ascenty Data Centers, since it is Carrier Neutral and connectivity is made through integrations and cross connections, either through any carrier or its own network. This is the best path to reach the main carriers, providers and content that the market can offer and demand.
 

Why is it important for a Data Center and an NAP to be Carrier Neutral?
 

Simply because it allows them to enable any level of connectivity from any carrier, regardless of which provider your company has chosen.

When it comes to the infrastructure, Ascenty’s NAP (Network Access Point) customers can also rely on the dedication of a leading data center infrastructure provider throughout Latin America.

Excellence in providing high quality standards in connection is one of the core businesses of the company, which has its own fiber optic network, in addition to more than 60 providers spread across Brazil.

Need to improve the quality of your connection, adding redundancy and more security for your data? Talk to one of our specialists right now and find out how the NAP (Network Access Point) solution can solve your connectivity problems!

Read More

Because flexibility is essential in security related matters

Information Security is a great ally in harm-reduction strategies and flexibility is a major differential during database attacks. Security is essential when dealing with extremely important and confidential information, as it provides reliability, demonstrates compliance during audits or regulatory inspections and ensures business continuity in the event of a failure or attack on the system.

There are several flexible technologies available for crisis prevention and resolution. They include:

Install an AntiSpam program

E-mails are a very important communication channel and can also be an entry point for viruses or other system hacks. Using an AntiSpam program is a simple and flexible way of protecting the computer and the company network. This tool helps select unwanted messages and removes them from your inbox. This means that employees do not lose time deleting infected e-mails.

Invest in a digital Certificate

This technology allows the user to safely conduct online transactions and communications. The digital certificate acts as a virtual identity of a private individual or company, device or website. This digital signature guarantees authenticity and integrity of the most sensitive data. This technology can be used for counterfeiting and fraud prevention.

Use a content filter

Your company’s internal network can have content filter tools to stop users access sensitive data or block malicious entities that may pose a risk to the company or its network. This tool provides an edge by providing extra security via site keywords. Furthermore, these filters increase productivity by preventing access to certain websites that are not directly work-related, such as online gaming sites.

Protect your network against DDoS attacks

DDoS (Distributed Denial of Service) attacks overload company network connectivity, which includes desktops, notebooks, cloud services, providers and IoT (Internet of Things) devices. Each of these devices could become an entry point for hackers to try and infiltrate the network after DDoS attacks.

This demonstrates the importance of prevention and adoption of a DDoS attack management system, in order to stop high volume traffic affecting equipment that provides connectivity and internet access. These attacks could also be used to draw attention away from attacks intended to steal data and carry out other crimes.

The speed these attacks are dealt with is extremely important and they can be prevented without disconnecting or switching off any servers. There are solutions that you can adopt that have been specifically developed to protect your company from these kinds of threats.

Cloud backup

Backing up to cloud serves makes a huge difference in times of crisis, speeding up recovery of sensitive data that a needs to keep running. Cloud computing is the best option for fast data recovery. This technology also can keep your systems up to date and secure. There are several cloud service options that offer protection and you can even use different services depending on your business requirements.

End point security

It is extremely important to focus on your end points! Failure to address mobile devices, desktops and notebook could threaten your entire security strategy. This security measure blocks pen drive access to networks, avoiding unwarranted data transfers that could damage or infect your network.

Security solutions are an important issue for all types of organization and security technologies enhance service performance. This means security is a crucial aspect when dealing with information. Did this article help you to find solutions and promote information security? Contact our specialists!

Read More

Vitória Hotels enhances its IT environment with Ascenty infrastructure

We proudly present the positive results of our partnership with Vitoria Hotels, a chain that runs 5 hotels in Campinas, Paulinia and Indaiatuba. At the end of 2014, the customer transferred a large part of their structure to an Ascenty Data Center, leading to increased security for all its information and processes and greater real-time availability and redundancy.

The Chain

Vitória Hotels relies on the Ascenty market-leading services, a high density co-location structure that ensures more efficient data protection as well as increased availability and redundancy for all operating systems. To support this infrastructure, the customer also hired the dedicated lan-to-lan links on Ascenty’s proprietary network, guaranteeing lower latency and more robust Internet access, as well as the convenience of contracting everything from a single data center and link provider.

Customer Services

The Ascenty data center met all of Vitória Hotels’ requirements, providing the necessary technical differentials that the project required, such as high quality customer service and robust infrastructure, as well as certificates that guarantee data security and protection.

“Ascenty’s excellent technical support, the quality of the infrastructure, robust data protection and real-time redundancy were the differentials that made this partnership work. We also plan to transfer all of our data to the Ascenty Data Centers in the near future”, says André Luiz Dario, TI Manager at Vitória Hotels.

“We are very happy with our partnership with Vitória Hotels. We work hard to understand all of our customers’ requirements so we are able offer a meaningful service that reduces costs by increasing availability and fully securing their information”, says Roberto Rio Branco, Marketing, Sales and Institutional Director at Ascenty. “In addition to our physical security, which includes power contingency plans, triple infrastructure redundancy and many other resources, we also hold the most stringent cyber security certificates, proving that Ascenty is a partner you can depend on to store and process critical data securely”, he adds.

About Vitória Hotels

The hotel chain was founded in 2000 when the Residence NewPort unit, ideal for long-term stays, was unveiled in Campinas. Over the following 16 years, Vitória expanded across the Campinas metropolitan region and currently manages five hotels, three in Campinas (Vitória Hotel Concept Campinas, Residence New Port and Vitória Hotel Express Dom Pedro), one in Indaiatuba (Vitória Hotel Convention Indaiatuba) and the most recent unit in Paulinia (Vitória Hotel Convention Paulínia). All of the Chain’s ventures conform to high quality standards and are constantly striving for service excellence, all of which has made the company a benchmark for hotels across the state of Sao Paulo. Importantly, besides the hotels, the Chain also manages eight restaurants offering a variety of cuisines which have won awards from Veja Campinas Comer&Beber magazine, including the Bellini Ristorante (Mediterranean cuisine), Kindai (Asian) and Esquinica (Contemporary). To find out more, please visit www.vitoriahoteis.com.br

Read More