Data Center

How to Sell Value to a Skeptic

 

We all live in the day where quantity often goes above quality. In today’s corporate environment it’s no different. Many business strategies are to make as much money, as quickly as possible, with the largest margins.

Lower consumer pricing requires lower product overhead. This often results in lower quality products, such as clothes for an example.

Consider this. Finding a reasonably nice-looking piece of apparel that is priced at an unbeatable deal sounds too good to be true… and most likely is! We don’t always like the price tags of the higher end merchandise, but over the course of time, you tend to have to replace your “amazing deal” item several times due to lack of quality materials and poor assembly. Typically, a higher priced item with the proper care holds up for years to come.

In the long run, you invest more time, money and energy on the lower-end items than you would if you had originally invested in the higher quality item. This applies for many areas in today’s industries, especially technology.

Pricing does play a key role in any decision-making component, but that should not be the only factor when making key strategic decisions.

In the following example, I identify some components that are of top priority when deciding on a disaster recovery data center location and strategy: What are your priorities?

  • Price
  • Security
  • Connectivity options
  • Location
  • Onsite support
  • Uptime
  • Growth capability

These play a part in identifying what options are on the top of your list and will help you determine what type of quality or quantity solution best fits your needs. Not all quality solutions will be the most expensive just as not all low-quality will be the most cost efficient. If you value a long lasting positive relationship with your data center, finding the appropriate balance in cost vs. value and quantity vs. quality is key.

It’s an age old lesson, while choosing price over value sounds like a win-win situation in the short-term, you will quickly realize that the only way to have a long lasting partnership, product and or company is to put quality and value as your top priority. As they say, measure 2-3 times and only cut once.

Data Center

Why You Should Spend More Time Thinking About Data Security

The information technology industry goes to great lengths to protect its data.  We often employ multiple layers of security through IPS (Intrusion Prevention Systems), IDS (Intrusion Detection Systems), firewalls and anti-virus. What happens if someone can physically touch and affect your equipment? We are usually so busy preventing digital attacks that we forget about physical attacks.

If you manage your servers in your own building, consider asking yourself who has access; employees, building maintenance, cleaning staff? How secure is your physical infrastructure? If you’re unsure, it may be time to consider your security options.

Most in-house data centers are generally located behind one or two locked doors.  We’ve seen on-site telecom rooms secured with access control but have a shared suspended ceiling with adjacent offices and hallways.

In a colocation data center, where you host your mission critical or backup infrastructure in a dedicated data center operated by a partner, physical security is a way of life.

How FIBERTOWN Layers Physical Security Controls

data center security

Data Center Room Controls

Human access is controlled through RFID (key card access) and biometrics. Private data center suites and cages feature key lock access or card readers.

Video surveillance and archiving run 24×7 from more than 70 cameras throughout the facility. Reports can be generated at any time showing traffic flow within our facilities. Escorted access-only for all non-approved visitors.

Building Interior Security

Purpose-built rooms keep customer and telecom equipment highly secured. All HVAC, power and building systems are monitored 24×7 by the Network Operations Center.

Defense mechanisms protect against potential hazards including overhead and underfloor smoke detection, leak detection on all underground piping and dry-pipe pre-action fire suppression in zones throughout the facility.

Site Security

The FIBERTOWN HOUSTON entrance is manned 24×7 by onsite security, behind bullet-proof glass doors with key card access controls. Guests must check in and present proper identification. All visitors are escorted through the data center by security guards.

Perimeter Security

A perimeter fence and guarded entry gate provide authorized-only access to the data centers. The private parking lot is monitored 24×7 by onsite personnel. Video recording and monitoring track everyone in and out of the facility.

Understanding not only the digital points of failure but the physical access to equipment is a key component in any business continuity plan.

When troubleshooting IT issues, professionals generally take a bottom-up approach…why not extend this logic to your data security?