1

Physical
Security

WHOA.com has partnered with only Tier IV Data Centers that exercise stringent security policies to ensure physical access to systems is protected at all times. All of WHOA.com’s data centers require proper identification and authorization to enter the building. Each data center uses around-the-clock monitoring of facilities via closed-circuit TV and armed guards.

2

Network
Protection

The second layer protects traffic into the network at the perimeter. WHOA.com uses Palo Alto 5000 series firewalls for visibility into and control over traffic entering and exiting the data center. In addition these firewalls provide antivirus, intrusion protection, application protection, data filtering, malware protection and more.

3

Secure
Multitenant
Architecture

Using various technologies such as VLAN, VXLAN and SAN vServer segmentation, WHOA.com securely isolates customers’ workloads.

4

Per-tenent
Firewalls

This means each WHOA.com tenant has its own isolated firewall. This enables these clients to manage and secure their infrastructure both internally and externally from threats that may arise on the Internet.

5

Host
Based
Firewalls

WHOA.com encourages all customers to use firewalls built into the operating system. This additional layer helps protect systems from attacks that may get past the perimeter or originate from the inside. WHOA.com works with its customers to ensure their systems are protected.

clouds
6

Antivirus

WHOA.com offers managed hosted antivirus for customers who don’t want to manage that function. The antivirus layer scans the customer system for internal and external system security threats.

7

Backup &
Replication

WHOA.com automatically replicates customer data sets to a different geography to ensure that data is not only protected from network-based threats, but also from physical and environmental threats.