Data Centers

Secure and Resilient Data Centers
Our Data Centers

Operating from multiple resilient data centers, Global Data Vault’s primary data center is the Infomart in Dallas, Texas, where we utilize:

  • Local telecom service from every (8) US tier-1 Internet Service Provider: Level 3, AT&T, Centurylink/Quest, XO, GTT, Verizon, Sprint, Zayo. Plus at least 50 additional fiber providers.
  • Over 60 Megawatts on site with each quad being serviced by two primary utility feeds from separate substations and one secondary feed from alternate transformer banks.

Our redundant facility is Lone Mountain in Las Vegas, Nevada. Lone Mountain is the only Tier4 Design Certified data center in North America.

Primary advantages of Lone Mountain:

  • Highly resilient construction including 94 UPS modules and 8 megawatts of power generation capacity.
  • Highly secure design including 5 separate security zones.
  • Nevada location provides exceptional isolation from natural disaster.

We operate a dedicated private no-hop gigabit link between the two sites.

no-hop gigabit link between resilient data centers

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

Counting down the worst cyber security breaches of 2018 – #4

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Global Data Vault’s Mid-Year Count-Down of the Worst Cybersecurity Breaches

Number 5: VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers,...