New Year, New Data Center

New Data Center
As IT backup and recovery experts, the secure storage of our customers’ critical data is priority one. As such, we’re always improving and innovating, which is why in late 2018, TECA moved to a new highly secure Data Center.

To assure our clients that their applications and data are receiving the utmost protection and availability, we are pleased to provide you with information about this enhancement to TECA’s infrastructure.

  • What certifications are held at the new Data Center? Is the Data Center audited each year?
  • The Data Center completed an SOC I, and beginning in 2019, a SOC II audit against its entire controls document library. And although the Data Center has made the business decision to not pursue the ISO 27001 certification at this time, all documentation of policies and procedures have been written to achieve those standards.
  • Does the Data Center have a 24×7 Network Operations Center?
  • Yes, the Data Center has a Network Operations Center and is manned 24x7x365 by a seasoned and professional technical staff.
  • What training and certifications do the hands-on engineers possess?
  • All staff go through extensive training programs for the department they serve and are placed in tiered positions according to their experience level. Many hold various Microsoft certifications.
  • How is the Data Center protected against natural disasters?
  • One of the most impactful decisions in the mitigation of risks associated with disaster events is the physical location of the facility. The Data Center location was chosen from a list of multiple properties after the careful consideration of all potential risk within the area and the building’s ability to mitigate those risks.
    Multiple factors were considered, including but not limited to: building construction, supporting infrastructure, connectivity, HVAC systems, power grids, fire detection/suppression, and water detection. Adherence to the strictest standards in these areas resulted in the choice of the highly secure Data Center.
  • What type of uptime can be expected following a disaster?
  • Timelines are incident-specific. Environmental security and connectivity control procedures are designed to mitigate all service-affecting incidents. Should an outage occur, the business continuity procedures are designed to immediately restore all services once external influences are corrected.
  • Is the entire Data Center carrier-neutral?
  • The facility’s network has been designed to all but eliminate the potential interruption of connectivity by engineering the facility to utilize vendor neutral internet connections. In addition, the distribution paths utilize fiber ring routing loops through multiple carriers. These features allow for exceptional redundancy and the ability to create a network connectivity matrix that allows for utilizing weighted metrics in path selection, increasing efficiency and reliability while minimizing costs.
  • Describe the physical security at the Data Center.
  • Key facility resources are designated as either Critical or Non-Critical. The biometric and pass card security solution prevents movement between or access to the different zones within the Non-Critical areas. The access system records all access requests, both successful and denied. The Data Center is deemed a Critical area. Only select individual employees within the company can access the Data Center directly. The facility employs multiple layers of security throughout the Data Center which include ID badges, cameras, biometric access system, physical patrols, external lighting, key locker/rack access, electronic security system, concrete barriers, fencing, and photographic recording.
  • How often is the power switching tested for load performance?
  • A full load transfer is conducted monthly, at a minimum. During this test, a complete power failure is simulated to ensure all aspects of the emergency power infrastructure are operating correctly. The Data Center is then run in emergency power mode under full load for a minimum of one hour.
  • How is temperature controlled in the Data Center?
  • Temperature and humidity are monitored with multiple systems. Corrective actions are then completed by any of the numerous HVAC systems throughout the Data Center.

Interested in learning more about the advantages of Veeam, cloud computing or any of the services TECA Data Safe offers? Contact us today.


If your organization hasn’t implemented Cloud Computing yet, you could be paying a high price in decreased productivity, lost revenue, increased costs, and lack of security.

TECA Data Safe Cloud Computing addresses all those challenges while putting innovative technology at your fingertips, increasing security, decreasing capital expenditures, maximizing your efficiency, and more. Download our free informational brochure on Cloud Computing. Then contact us today to find out how TECA Data Safe can help you.

True or False?

How much do you know about Cloud Computing? Test your knowledge with these True or False statements:

  1. Cloud Computing doesn’t work when it rains or snows.
  2. Companies with tons of data can run out of storage room by filling up the cloud.
  3. Recovery times for businesses using Cloud Computing are four times faster than for businesses not using it.