We Provide Answers to the Most Common IT Questions We Get

How can I protect my customer's confidential data? Will cloud-based services work for me? Am I protected from a potential disaster? Find answers to these questions and more in our FAQs. If your pressing questions are not answered here, give us a call to make an appointment with one of our IT experts.

  • Page 1
  • Why should I choose ATI over Amazon Web Services (AWS)?

    ATI Web Services Word CloudBusiness owners often consider Amazon Web Services (AWS) when they begin transitioning their business to the cloud. As a large provider of web services, AWS can offer cloud computing at a relatively low cost. However, many independent providers offer the same products and services, with the added benefit of keeping your operations close to home.

    Choosing Between ATI and Amazon Web Services

    ATI Solutions offers the same flexibility and scalability of major cloud providers with the addition of having a full-service staff of technicians on-site and ready to help clients implement the platform and deployment options that work for them. Since we offer multiple levels of cloud deployment that allow you to maintain as much control of your online processes as you’re comfortable with, your customers enjoy a quality online experience, and you have the peace of mind that your business will remain up and running at optimal levels 24/7.

    At ATI, our technical staff can help with a variety of cloud deployment concerns, including:

    • What if my business needs change suddenly? – ATI’s hosting options are tailored to each individual client we serve, and we recognize that your cloud computing requirements must be flexible. You will not be limited to a set amount of bandwidth or storage, and can quickly access additional computing resources as you need them—and with our “pay as you grow” pricing, you will only be charged for the resources you use.
    • Will I have to get all new software? – Our services support multiple operating systems and programming languages, allowing you to select the programs and development platforms that are most beneficial to your business. In addition to deciding which services you want to use, you can also select the manner in which they will be implemented.
    • What if an adverse event occurs? – Our servers are configured to switch mission-critical operations to offsite secure alternative servers in the event of a power outage or other service interruption. We have multiple redundancies in place to ensure minimal end-user disruption.
    • What if I need help? – Our technicians are available around the clock to provide intervention in the case of an emergency as well as help you discover better and more efficient ways to serve your customers.

    The professionals at ATI can evaluate your needs and help you determine which storage and service options are right for you. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What is 2N redundancy?

    Data centers are responsible for providing reliable and uninterrupted service for their customers around the clock. Unfortunately, these facilities are not infallible, and will always be susceptible to sudden power interruptions caused by weather, equipment failure, or sudden loss of municipal utilities. Since an unplanned outage can cost a company thousands or even millions of dollars in just a few minutes, many data centers offer multiple redundancies to prevent downtime.

    Differences Between N+1, 2N, and 2N+1 Redundancy

    Redundancy is the duplication of critical components of a system in order to provide a reliable backup in case of sudden failure. Data centers typically offer some form of redundancy for power, ensuring that the customer’s systems and devices will continue to operate with no noticeable effect to the user in an outage. However, not all data centers’ redundancy systems are equal.

    The most common redundancy options in carrier facilities include:

    • N+1. An N+1 system, also known as parallel redundancy, offers alternate, redundant components capable of handling 100 percent of the work needed to supply power to the customer’s equipment in case of component failure. Although this system contains redundant equipment, it may run on a shared main power source, so it is not a multi-independent, redundant system.
    • 2N. A 2N system offers not one, but two uninterruptible alternate sources of power, offering seamless transitions between sources to continuously support the customer’s systems and equipment. In addition, the power sources are run separately, fully independent of each other, and go through a fully redundant path to eliminate any single points of failure. 2N systems are more reliable than N+1 systems because they offer at least two options for power in the event of failure, and can be regularly maintained, independently, and be used in the event of an extended power outage. Our Chantilly location offers 2N redundancy for data loss and downtime prevention.
    • 2N+1. A 2N+1 configuration is the highest common tier of downtime prevention, and offers double the amount of power needed to run all client systems and devices. Additionally, each power source has separate, parallel, fully redundant components that can seamlessly power all necessary systems. All this means that if one component from one main power source used in the path fails, there is a backup component which can fully take on its role. This applies to all the components in each separate path from the main power sources.

    The professionals at ATI can evaluate your needs and help you determine which service options are right for you. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What does "facility is carrier neutral" mean?

    Carrier-Neutral Data CenterThere are two different ways to provide internet service in a colocation center: carrier-specific and carrier-neutral. Carrier-specific facilities have already chosen the carrier that will provide internet services, and it is the only option available to their clients. In a carrier-neutral facility, the data center is not tied to any one provider, and instead allows clients to choose between a variety of telecommunications and internet service providers.

    Benefits of Carrier-Neutral Data Centers

    Carrier neutrality can be a major asset for companies that want to get the most out of their data center services. Even if a business does not require carrier neutrality in its early days, it can be frustrating and expensive to make the switch to a neutral data center in the future.

    Carrier-neutral data centers offer customers many benefits such as:

    • Better value. Since the data center accommodates a variety of providers, these providers will increasingly offer benefits to remain competitive in the market. Several companies vying for your business allows you to choose the perfect combination of all the services and options you might want to meet your current and future needs.
    • Lower prices. A carrier-specific center might not allow clients to choose their network, hardware, or even software vendors, charging you for a one-size-fits-all service costing you exponentially more long term. Multiple carriers in a single data facility helps you negotiate the prices down not only of your main carrier’s services but of your secondary carrier’s services as well.
    • Flexibility. Clients in a carrier-specific facility will be limited to the bandwidth and network options provided by that data center’s specific carrier, while those in neutral facilities can select service levels that will guarantee their required amount of uptime. They can also either scale up or scale down their required services with much more ease, even have the possibility to switch to a different carrier later on if needed.
    • Protection. Carrier diversity is necessary for redundant systems, and is invaluable when it comes to cyberattacks, service outages, and data loss events. If one internet connection fails, an alternative carrier can instantly continue to provide support for vital systems, while interconnectivity between providers can continuously backup and transfer files to protect against data loss. In a carrier-neutral facility, you also get a say in exactly how you want your configurations for redundancy set up.

    The professionals at ATI can evaluate your needs and help you determine which storage and service options are right for you. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What is a DDoS attack?

    DDos Attack on a BusinessA distributed denial-of-service (DDoS) attack occurs when multiple computer systems attack a website or server, flooding the network with messages or connection requests. The attack overloads the system, severely slowing it down or even completely crashing it, resulting in a denial of service for legitimate users. These attacks can prevent users from performing their daily duties and operations, potentially costing your company millions of dollars and putting your company at risk of many other types of attacks.

    How a DDoS Attack Occurs

    Typically, an intruder begins a DDoS attack by invading a target computer or system through a security vulnerability or email virus. This is done by exploiting a known issue (such as a bug in a recent software update), opening an email with a virus, or bypassing security systems by something as simple as guessing a weak network password. Once the intruder has access, he or she can use the compromised devices to flood the target with bogus requests and traffic, forcing it offline.

    There are three main kinds of DDoS attacks:

    • Network-centric attacks (also called volumetric attacks) cause a denial of service by taking up all of the available bandwidth until it critically slows the system down or completely crashes it.
    • Protocol attacks (also known as state exhaustion attacks) exploit flaws in the transport layer, overloading the available resources in the targeted systems such as firewalls, load balancers, and servers.
    • Application layer attacks use bugs and vulnerabilities in the applications and software to inundate all available applications or databases with application requests, making it impossible for legitimate requests to get through.

    DDoS Attacks are Constant Threats to Business Owners

    Once an intruder has control of one system, he or she can use the internal network connection to identify other vulnerable systems and infect them with malware or control them remotely. The first compromised computer, known as the DDoS master, is used to gain control of others in the system—causing a network of infected systems commonly referred to as “bots.” The intruder then has full command of the network of bots, which can consist of hundreds of thousands of individual terminals, networks, or access points. Once fully compromised, your business can no longer perform its daily operations, causing your company to lose revenue and possibly customers altogether. This also puts you at risk of extortion, since the attacker can maintain your system shutdown for hours or even days. The attacker can also overwhelm your equipment to the point of permanently damaging it, requiring your company to purchase expensive new equipment. DDoS attacks often also act as distractions, allowing attackers to carry on with much more severe and detrimental cyber-crimes.

    DDoS attacks are a constant threat to business owners, but the right protection and recovery protocols can significantly reduce or eliminate the impact on your commercial enterprise. At ATI, our managed IT services and patch management enables us to rapidly deploy emergency patches for Microsoft servers and workstations and third-party software, helping to avoid attacks before they occur. If your system has suffered a DDoS attack, our Disaster Recovery as a Service (DRaaS) can provide third-party server hosting and cloud resources to restore your operations as quickly as possible.

    The professionals at ATI can evaluate your needs and help you determine which storage and service options are right for you. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • How is my data being protected?

    Protecting Your Virtual and Physical DataSo many business owners oppose outsourcing their technical processes and critical hardware because they do not want to risk a security breach or create extensive downtime. While these risks are very real, they are minimized considerably with the right fail-safes and data protection procedures. ATI Solutions is a high-availability data center, utilizing reliable systems and components that will keep your virtual platform operational around the clock.

    Our Physical and Virtual Data Protection Services

    Our technicians and engineers understand that any compromise to your systems can directly affect your ability to retain and serve your customers. Whether you have entrusted us with your hardware, your virtual platform, or the full range of your IT services, it is our goal is to provide you with continuous and secure operations that can be scaled up or down to meet the needs of your business.

    Our data centers offer the following protection methods:

    • Redundancy. We have multiple redundant systems and components to eliminate downtime, all of which are maintained by onsite personnel and are regularly tested. Our Chantilly location offers 2N redundancy for power and cooling, while our Rockville location has N+1 configuration for power and cooling.
    • Failover. We configure servers to switch mission-critical operations to a secure alternative server so that in a scenario where a sudden adverse event occurs (such as a power outage, natural disaster, or equipment failure) all function will seamlessly be transferred. This process allows operations to continue without disruptions to the user experience.
    • Hardened security system. Our data centers use industry-standard privacy measures such as 24/7 security surveillance monitoring, CCTV with 365-day retention, and multi-factor access control system with biometrics, security PINs, and access card readers.
    • Immediate intervention. Our business continuity team performs emergency and preventive services, helping you respond to an emergency and maintain your presence with as little interruption as possible.

    The professionals at ATI can evaluate your needs and help you determine which storage and service options are right for you. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • How much space will I need in a colocation center?

    Server Space in a Colocation CenterYou are ready to take your network to the next level, but you are not sure if a colocation provider is the best option. A colocation center can provide the power, cooling, bandwidth, and security necessary to store your servers and to keep your network up and running; however, there are monthly fees and rental costs needed to do so. As a result, you should carefully consider what your current needs, growth objectives, and the many options you have before you buy.

    Types of Server Space Available in a Colocation Center

    Data centers use a standardized measurement system when it comes to classifying server space. A (U) is the term used to measure storage space in racks, and the standard physical measurement of one rack unit (U) is 44.45 mm or 1.75 inches in height. From there, the amount of space used by a business can vary from inches to several thousand square feet depending on the scale and complexity of its network infrastructure.

    Because space is offered in many different ways in a data center, below are some of the common rental options and their distinct advantages:

    • Racks. In a colocation center, servers, network devices, and other hardware are mounted in a frame called a rack, making it easy to replace failed components. A standard rack is 19" wide, can accommodate several U in height, and each server rack shelf is positioned to provide optimized cooling. Data centers may allow customers to rent quarter, half, or full racks.
    • Cabinets. A cabinet is an enclosure that acts as an outer shell or casing on a rack, which is locked and kept secure by the colocation provider. Fundamentally, all cabinets serve the same purpose. However, they can physically vary from being a separate enclosure installed around a rack, a larger enclosure meant to closely house multiple full racks, or even a “one-piece” design where the racks and the cabinet are one unit. Depending on security preferences, a customer may require an entire cabinet or share a single cabinet with other customers.
    • Suites. Customers who require either higher security, extensive storage, or both may store their servers in large locked areas, commonly referred to as suites. A suite can be a large metal cage, a locked transparent room, or a secure confined area composed of privacy paneling. Suites house several or hundreds of cabinets depending on the desired square footage.

    If you are anticipating rapid growth, it may be a good idea to invest in one of these storage options now to avoid the headaches of a massive data center migration later on. ATI offers secure server storage in one of our two DC-area data centers, both of which offer critical systems monitoring 24 hours a day, seven days a week, 365 days a year. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What cloud infrastructure plan is right for my business?

    Do You Know the Hosting Options for Cloud ComputingOnce you have decided to invest in cloud computing, you will need to consider who will be responsible for hosting and maintaining your infrastructure. Large corporations may host their own platforms onsite, but this is often not feasible for small- or medium-sized businesses who do not want to devote a large portion of their resources to the IT department. Fortunately, third-party hosting services can take on as much or as little of the hosting and deployment necessary for your virtual environment.

    Hosting Options for Cloud Computing

    In most cases, businesses have three options for the deployment of a virtual platform: hosted infrastructure, hybrid infrastructure, and private infrastructure. Each one carries significant advantages, and can be scaled to meet the changing needs of business operations. The following is a brief overview:

    • Hosted. A hosted cloud is owned and maintained by a service provider, with the hardware necessary to deploy the cloud in an offsite location. The business pays a monthly subscription fee, and the provider manages all of the applications and services.
    • Hybrid. In a hybrid system, part of the infrastructure is hosted by a provider and part is hosted by the business. This system can involve many different combinations of solutions depending on the individual needs of each business. One of the benefits of a hybrid solution is that it allows companies to migrate into the cloud slowly, keeping sensitive systems onsite and using hosted clouds for less critical applications.
    • Private. A private infrastructure is optimal for businesses who want to keep their servers and equipment onsite. The hardware is kept on the company’s premises, and the service provider is responsible for deploying and maintaining the cloud platform.

    Many different factors can impact the choice of an infrastructure plan, including the type of industry, client base, and scale of operations. The professionals at ATI can evaluate your needs and help you determine which cloud computing plan is ideal for you. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What is patch management?

    Do You Know What Patch Management Is?Patch management consists of grading new patches, testing them, and pushing them out. Patching plays a crucial part in businesses staying up-to-date with the newest versions of all the software they use on a day-to-day basis. Patching can correct known issues without installing new programs from square one. The system will remain secure and navigable without any disruption to the user when patches are implemented correctly.

    Importance of Patch Management for Businesses

    A patch is a piece of code that is created to be integrated into an existing software program. Software providers often release patches as new “updates” or “versions” which can improve functionality, performance, provide bug fixes, and prevent security breaches. Installing a Windows update or upgrading to the newest version of an iPhone app are examples of patch deployment. Without good patch management, a company could have a vulnerability in its software that a hacker could take advantage of—which could lead to stealing private information or bringing down the entire system.

    Software developers will typically release new patches when:

    • The developer has received reports of successful hacking in one of their applications
    • The developer’s coding and testing team discovered a glitch before it could be exploited
    • The developer has found a better way to implement or strengthen security
    • The developer has improved user interface on one or more applications

    Software and applications cannot exist in a vacuum. They will need to be updated regularly—in most cases, every few weeks—in order to function as intended. As businesses may neglect to install patches or fail to identify weaknesses in their systems, patch management is a necessary part of any IT service.

    Our team is proud to offer patch management for all Microsoft releases, as well as third-party software programs. We also identify potential security threats before they can be exploited, implement emergency patches for disaster recovery, and provide you with a report detailing any potential vulnerabilities. Contact our family-owned DC-area data center today to get more information about how we can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What are the benefits of Software as a Service (SaaS)?

    Do You Know How Software as a Service Could Help Your BusinessOne of the many major benefits of secure cloud computing is the ability to deploy and access business software applications without the need to host servers onsite. Companies that subscribe to Software as a Service (SaaS) can access most of their core business functions through the internet just by opening a web browser, relying on software vendors to host, maintain, and deliver applications through the cloud.

    Advantages of Software as a Service (SaaS)

    SaaS is ideal for small- to medium-sized businesses who do not want to invest in their own virtual environment. The SaaS vendor hosts the servers and hardware, maintains the databases and code for all applications, and essentially performs the majority of the company’s IT operations.

    Major benefits of SaaS include:

    • Pricing. For a monthly or yearly subscription, SaaS vendors take the responsibility of installing, managing, and upgrading software, as well as remediating updates and maintaining software licensing. This allows the company to focus on their goals and objectives while greatly cutting down their stresses and costs.
    • Customization. Businesses can pick and choose their most used and critical software, allowing the company to streamline all their day-to-day business operations.
    • Flexibility. SaaS offers a company global access, so no matter where you are in the world you can connect and use the software that you need at that particular moment.
    • Automatic updates. We automate patch management, and upgrade to new versions without your incurring additional software costs. Our SaaS platform offers Microsoft’s Service Provider License Agreement (SPLA), making it easier for us to maintain license count and stay current with Microsoft’s frequent upgrades for your business.

    ATI Solutions is proud to offer a wide range of technical services for all sizes and types of business operations, allowing your IT processes to be as stress-free as possible. Our family-owned DC-area data centers offer all the power, connectivity, protection, and security you need in a location that is close to home. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.

     

  • What is Infrastructure as a Service (IaaS)?

    Do You  Know How You Can Benefit From a IaaS?Infrastructure as a Service, or IaaS, is a way for businesses to have flexible cloud computing without the need for installing and managing their own virtual platforms. A third-party cloud provider hosts the infrastructure components—including servers, storage, and networking hardware—allowing the business to run its online processes and applications through the cloud.

    Advantages of Infrastructure as a Service

    IaaS is a great option for businesses of all sizes who want to focus on their daily operations without devoting resources to IT management. The infrastructure is hosted on the business’ server and the client accesses operations remotely over a network. The system stays in a secure location, and the business runs all of its programs through a virtual environment using virtual machines (VMs).

    There are many reasons a business may choose IaaS, including:

    • Cost benefits. IaaS is typically purchased on a usage-based, pay-as-you-grow system, and only charges clients for the number of machines and resources that are actually being used.
    • Resilience. IaaS cloud providers have the ability to run large numbers of VMs for multiple clients, allowing businesses to run large workloads without worrying about service availability and performance.
    • Scalability. Clients can scale their needs up or down without delays or service interruption, while not having to worry about purchasing additional licensing for the hypervisor or virtual platform licensing—which can become costly very quickly.
    • Security. Not only do data centers offer physical security, but there are also additional options for virtual security. These include the most up-to-date patched systems, intrusion detecting software, virtual environment security that is segmented over a massive network of WAN connections, and virtual private networks (VPN) to protect data during transmission and storage.
    • Backup and data recovery. IaaS can be utilized from any secure terminal, making it easy to institute a disaster recovery plan immediately using cloud-hosted backups. With IaaS, your back up and data recovery is available depending on your back up schedule and retention time periods.

    ATI Solutions is proud to offer a wide range of technical services for all business sizes and types of operations. Our highly flexible IaaS options can support large numbers of virtual machines with fully-redundant backups, allowing your IT processes to be as resilient and stress-free as possible.

    Our DC-area data centers offer all the power, connectivity, redundancy, and security you need in a location that is close to home. Contact us today to get more information about how our data centers can serve your needs or set up an appointment to tour our Chantilly facility.