Reduce operating costs keeping your data safe
Many businesses do not have the appropriate internal setup to host their servers and other computing hardware, leaving their IT environment vulnerable. Cover-All has built-in multiple layers of redundancy at every level, including physical and environmental, to keep your systems, network, applications, and data safe. Our Data Centre is staffed and monitored 24/7/365 and is SOC 2© Type II Audited and ISO 27001 Certified. With a 99.99% availability, you can rest assured that we will keep your IT environment running smoothly. You will also realize exceptional service through our Service Desk.
Cover-All provides Co-Location services enabling you to rent space, suites, cages, or cabinets for servers and other computing hardware in our purpose-built Data Centre. We provide the building, cooling, power, bandwidth, physical security, and redundant systems while you provide the servers and storage. By hosting your IT infrastructure with Cover-All, you can rest assured that your data is safe while reducing your IT operating costs.
Our base cabinet offering includes
In addition to our regular Co-Location services, because we are a 24/7/365 operation, we can provide additional services that most co-location providers can’t. We provide ‘Rack and Stack' services where we physically install/uninstall your servers/blades/etc. from or to your cabinet, cage, or suite. We also offer ‘Hands and Eyes’ services, providing monitoring support and hands-on activities when and where required.
SOC 2 TYPE II AUDITED
What is SOC 2?
CPA Canada and the AICPA have jointly developed the SOC 2© (Service Organization Controls) standards of how organizations should manage customer data.
Why is it important?
Cover-All SOC 2 TYPE II Audited
Cover-All has invested thousands of hours in attaining and maintaining standards set by world-class accreditation organizations. Cover-All has the processes and procedures necessary to certify the highest levels of quality control, security, and process improvement, including SOC 2 TYPE II.
Security
SOC 2 Security refers to protecting systems resources throughout an organization to ensure data is secure from unauthorized access. This includes a broad range of risk-mitigation components, such as endpoint protection and network monitoring tools that detect and prevent unauthorized activity.
Availability
SOC 2 Availability refers to the demonstrable internal controls that maintain systems’ operational uptime and performance to meet client service level agreements.
Process Integrity
SOC 2 Processing Integrity ensures that a system operates accurately and reliably. Data processing must be complete, valid, accurate, timely, and authorized to meet objectives.
Confidentiality
SOC 2 Confidentiality requires a company to prove it can protect confidential information. Controls for confidentiality include encryption, identity management, and access management. Government regulations, internal policies, and external parties may define these controls.
ISO 27001 Certified
What is ISO 27001?
ISO 27001 is the only auditable international standard that defines requirements for an Information Security Management System (ISMS), enabling organizations to manage the security of assets such as financial information, intellectual property, employee data, or information entrusted by third parties.
Why is it important?
Cover-All ISO 27001
Cover-All has invested thousands of hours in attaining and maintaining standards set by world-class accreditation organizations.
Cover-All has the processes and procedures necessary to certify the highest levels of quality control, security, and process improvement, including ISO 27001 Certification.
Build Confidence
Data security is critical to business success in today’s environment, where an organization incurs a security breach every 11 seconds. ISO 27001 Certification ensures that an organization has security standards in place to give clients confidence that their data and IT infrastructure are protected.
Security Assurance
ISO 27001 Certification is an independent third-party ISO-authorized certification body assessment that assures clients that the highest security standards are in place and are being followed.
Risk Management
ISO standardizes how information security is managed within an organization to prevent unauthorized physical access, damage, and interference to the organization’s data and information processing facilities. It ensures that data security is integral to information systems across the entire lifecycle. This also includes the requirements for information systems that provide services over public networks.
Ensure Compliance
An ISMS strategy with clearly defined best practices, policies, and procedures is critical to protecting your organization’s compliance. ISO 27001 Certification ensures that organizations realize legislative, regulatory, and contractual compliance requirements, helping to avoid costly fines, loss of reputation, or lost business. It is a benchmark for best security practices to ensure that information is secure throughout the organization.
Cover-All's cutting-edge Data Centre
Cover-All has built-in multiple layers of redundancy at every level, including physical, environmental and network specifications to keep your systems, network, applications, and data safe. With a 99.99% availability, you can rest assured that we will keep your IT environment running smoothly.
Physical Operations Security
Our Data Centre is 11,000 square feet of raised computer room floor space. Access is restricted by a monitored, dual authentication bio-metric physical access system and camera surveillance into the Network Operations Centre and throughout the entire building. It includes the digital recording of all motion, including monitoring of all exterior building entrances and raised computer room floor. Our Data Centre is staffed and monitored 24/7/365 and is SOC 2© compliant and ISO 27001 certified.
Environmental Security
Fire suppression
Our Data Centre is protected by a dual interlock pre-action dry pipe system with VIEW (Very Intelligent Early Warning system) technology. We also have dry chemical and CO2 extinguishers throughout the data centre, which undergo yearly inspection and maintenance. In addition, we have laser and moisture detectors located throughout the raised floor area and in the ceiling.
Cooling & Humidity Systems
Maintaining the cooling systems of a data centre is critical. At Cover-All, we have five computer room air conditioning (CRAC) units that maintain the temperature, air distribution and humidity in our Data Centre. With 110 tons of cooling, we have achieved N+1 redundancy. Our heating, air conditioning and ventilation equipment (HVAC) is under maintenance agreement and undergoes quarterly inspections.
Power Supply Security
Tested by multiple ice storms, our power supply has always been uninterrupted! Cover-All operates on an N+1 redundancy model, which means our electrical systems are fully redundant.
Our facility is located in an area with enhanced multiple routing within the Hydro grid, which helps maintain the grid's reliability by providing multiple routes for power to flow, allowing us to maintain our electrical systems.
We also have two 300KVA “Powerware UPS,” which provide uninterruptable power supply and surge protection. In the event of a hydropower grid failure, our two UPS systems will take over the load immediately. The UPS, or backup batteries, can handle the load for up to 45 minutes if necessary. If power is not restored within 30 seconds, one of our two redundant 800 KVA diesel generators will take over. Our generators are under a maintenance agreement and undergo testing on a bi-weekly basis, and semi-annual inspections and maintenance are conducted with a “Load Test.”
Environmental Monitoring
Cover-All has implemented Trivision’s DCIM solution for monitoring, alarming and reporting key elements within the Data Centre, including cooling & humidity levels, power feed and diesel generator status.
Cover-All makes use of the RTAM methodology for real-time alert monitoring. This methodology provides for setting major, minor, and informational alerts ensuring appropriate actions are taken in a timely manner.
Network Security
Separate and fully redundant high-speed network connections enter the building from different access points. All major Telcos have a fibre presence in our Data Centre, including Bell, Cogeco, Telus, Allstream, and Rogers. Multi-homed, dual Internet feeds in a high availability Border Gateway Patrol (BGP) setup gives us redundant internet lines, increasing the reliability and performance of our network.
Systems, Networks, Applications and Data Security
Many businesses need internal network systems to ensure they are secure from potential intrusions. Cover-All’s security architecture has the right security systems in place to ensure your systems, network, applications, and data are secure. Our systems dynamically adapt and assemble resources to handle potential attacks on our infrastructure. This includes both ‘Detective’ and ‘Preventative’ controls.
Detective controls
Cover-All’s intrusion detection and monitoring system is designed to alert to a potential attack, including viruses, malware, ransomware, phishing attacks and more. Our ‘detective’ controls are designed to detect and react appropriately to any potential threat. In the event of an attack, a detective control will automatically signal the ‘preventative’ controls to address the threat.
Preventive controls
Preventive controls strengthen the network by automatically sensing and quarantining potential threats before they enter the network. In addition, other preventative measures, such as two-factor authentication, ensure that only positively identified users are allowed access to your system. In contrast, unauthorized users are blocked from entering your system.
For more information, please contact us today!
How We Can Help Your Business
Achieve Your IT Goals
Cover-All Managed IT Services
Latest Co-Location News
The Role of the IT Department in Business Strategy
Achieve Positive Business Outcomes with IT Infrastructure ModernizationThe IT department was not [...]
Benefits of Co-Location of your IT Infrastructure
Co-location of your IT infrastructure is the utilization of space ranging from [...]
10 Critical Questions for your Managed IT Services Provider
Choosing the right Managed Services Provider (MSP) is critical to ensure the [...]