{"id":100,"date":"2024-06-26T12:37:14","date_gmt":"2024-06-26T12:37:14","guid":{"rendered":"https:\/\/4n.is\/?page_id=100"},"modified":"2024-08-25T13:13:55","modified_gmt":"2024-08-25T13:13:55","slug":"technologies","status":"publish","type":"page","link":"https:\/\/4n.is\/index.php\/technologies\/","title":{"rendered":"Technologies"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-fec661ebe1c3da1f9550c6425295ef28\" id=\"ghost\">Ghost DataCenters<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1792\" height=\"1024\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Ghost_dallE-3.webp\" alt=\"\" class=\"wp-image-103 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Ghost_dallE-3.webp 1792w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Ghost_dallE-3-300x171.webp 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Ghost_dallE-3-1024x585.webp 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Ghost_dallE-3-768x439.webp 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Ghost_dallE-3-1536x878.webp 1536w\" sizes=\"(max-width: 1792px) 100vw, 1792px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Security threats come in many shapes and forms, and that is why, we have a special category of DataCenters that we have labelled Ghost Data Centers. Their unique characteristic is that we do not know their location. They could be in a military bunker dug into the Swiss Alps, or somewhere submerged in water. Some might even be in the basements of your run of the mill house or office building. It isn\u2019t only in movies where sensitive data meets extortion. We are unknown clients to our suppliers, and they are unknown suppliers to us. Here is how we make this work:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As all the technology is encrypted, be it in volatile or non-volatile memory, in transit or at rest, we made it logically possible to make 10s of datacenters work asone, and establish an indestructible high<\/li>\n\n\n\n<li>throughput.<\/li>\n\n\n\n<li>Over the Top network. It is like Blockchain, but for connectivity utility.<\/li>\n\n\n\n<li>For as long as one survives, we exist.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-fb3b5fcdd3f16f4d4ce79c8c2157fe8b\" id=\"floating\">Floating VMs and Applications<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>We offer you the possibility to use your own IPs, in both versions, and can assign you our own as well. Our encrypted Over-the-Top network makes it possible to employ your IPs from multiple locations, making it the ideal choice to have off-site backups of your virtual machines and applications. Our live migration of networks, VMs and applications can be performed without even a second of downtime, where sessions stay up, and so does everybody\u2019s morale!<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1787\" height=\"1009\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Floating_2.png\" alt=\"\" class=\"wp-image-128 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Floating_2.png 1787w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Floating_2-300x169.png 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Floating_2-1024x578.png 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Floating_2-768x434.png 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Floating_2-1536x867.png 1536w\" sizes=\"(max-width: 1787px) 100vw, 1787px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-09916c4415d26fde417e3673234d337e\" id=\"territorial\">Territorial Compliance<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" width=\"1791\" height=\"1561\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/18-3.png\" alt=\"\" class=\"wp-image-129 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/18-3.png 1791w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/18-3-300x261.png 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/18-3-1024x892.png 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/18-3-768x669.png 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/18-3-1536x1339.png 1536w\" sizes=\"(max-width: 1791px) 100vw, 1791px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>You decide what to log and keep, and if you want, we can advise you on compliant retention policies, per country, territory or jurisdiction.<\/p>\n\n\n\n<p>We strive to operate in as many adverse jurisdictions as possible, in many economic zones, and background diverse locations. If you wonder why, ask a smart legal professional, or ask us!<\/p>\n\n\n\n<p>Let\u2019s keep it simple, our philosophy is to protect the technology of<br>\u201cyou\u201d, your data, and your business, by all legal means. <\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-20ba3c434d8c5c95596508832261ddc0\" id=\"road\">Road Warrior, Worry Free<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>If setting up users with company VPN access gives you stomach cramps, we have the right prescription for you.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Our ultra segmented networking capabilities can handle VPN clients just as well as onsite users.<\/li>\n\n\n\n<li>We provide 2-factor authentication, mutual trust certificate infrastructures, system integrity checks and 802.1X policy and access control<\/li>\n\n\n\n<li>Firewalling is performed in both layer-2 and layer-3, with strict control specific to IP versions. For instance, IPv4 uses ARP flow control, MAC address based blocks, source and destination IP rules, as well as content based filtering for 802.1X authenticated users with TLS packet inspection.<\/li>\n<\/ul>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1783\" height=\"1089\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/14-4.png\" alt=\"\" class=\"wp-image-130 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/14-4.png 1783w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/14-4-300x183.png 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/14-4-1024x625.png 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/14-4-768x469.png 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/14-4-1536x938.png 1536w\" sizes=\"(max-width: 1783px) 100vw, 1783px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-ef895fc9b85c876e6176d159327eea7a\" id=\"multi-dim\">Multi-dimensional Security &amp; Velocity Backup<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/multi-security-5-1024x585.webp\" alt=\"\" class=\"wp-image-111 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/multi-security-5-1024x585.webp 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/multi-security-5-300x171.webp 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/multi-security-5-768x439.webp 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/multi-security-5-1536x878.webp 1536w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/multi-security-5.webp 1792w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Our platform gives you layered fallback solutions to stay unscathed during an outage, or an attack. As most security professional can attest, weaknesses in security are rarely exploited by hackers at the core infrastructure level. Rather, even the most sophisticated attacks, tend to be a downstream process starting at the user level. As there is never a Zero chance at getting hacked, our default and preferred position is to log a maximum amount of information, keep it safe, and auditable.<br>We do this to apply sophisticated forensic techniques to analyze millions to billions of datapoints and get insight on the root cause of an incident. There is hardly anything more frustrating to move on from a costly outage or hack, not knowing what happened and how it happened.<\/p>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-2175c54a24c0a8840d1b330261b231c1\" id=\"dreamy\">Dreamy Migration<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>Our network topologies work seamlessly for multi-master nodes, live and hot backups, database synchronization and full disk replication.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>During a live migration or failover, all networking sessions remain connected, and that comprises established NAT contracts.<\/li>\n\n\n\n<li>A migration API provides bandwidth reservation capabilities up to 80gbps, as well as automatically optimized network acceleration features, including window sizing and layer-2 jumbo frames.<\/li>\n\n\n\n<li>Migrate cross continent easier than migrating to a different rack, that is our promise!<\/li>\n<\/ul>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/migrating-2-1024x585.webp\" alt=\"\" class=\"wp-image-110 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/migrating-2-1024x585.webp 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/migrating-2-300x171.webp 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/migrating-2-768x439.webp 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/migrating-2-1536x878.webp 1536w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/migrating-2.webp 1792w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-b58f293a597e0565923f87b83eea1dc1\" id=\"uplinks\">Uplinks Through Land, See And The Sky<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/satelite-2-1024x585.webp\" alt=\"\" class=\"wp-image-109 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/satelite-2-1024x585.webp 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/satelite-2-300x171.webp 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/satelite-2-768x439.webp 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/satelite-2-1536x878.webp 1536w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/satelite-2.webp 1792w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<ul class=\"wp-block-list\">\n<li>10% of our datacenters have 3 uplink technologies combining optical fiber connectivity, wireless radio, and satellite communication.<\/li>\n\n\n\n<li>In addition, any connected node, whether you connect your branch\u0002office or a whole datacenter, can be an exit path for your entire infrastructure. This includes private MPLS, BGP peering sessions, and local ISP uplinks.<\/li>\n\n\n\n<li>Companies may also arbitrarily elect local breakouts for any and all parts of their global network, be it for information safety, legal, or internal policy.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-heading-color has-text-color has-link-color wp-elements-a537f2a28f162d178162bcf655982889\" id=\"secure\">Secure Telecoms<\/h2>\n\n\n\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<p>Our decades of experience in secure telecoms, combined with our own end-to-end control of the service hardware and software, enables us to provide specialized, ultra secure telecom offerings, comprising voice, video, and team collaboration.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We own and operate ClearerLink, a unique global operator active on all continents and in over 70 jurisdictions.<\/li>\n\n\n\n<li>Check out <a href=\"http:\/\/www.clearer.link\" data-type=\"link\" data-id=\"www.clearer.link\">www.clearer.link<\/a> for more info<\/li>\n<\/ul>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Clearer-lin-2-1024x585.webp\" alt=\"\" class=\"wp-image-108 size-full\" srcset=\"https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Clearer-lin-2-1024x585.webp 1024w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Clearer-lin-2-300x171.webp 300w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Clearer-lin-2-768x439.webp 768w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Clearer-lin-2-1536x878.webp 1536w, https:\/\/4n.is\/wp-content\/uploads\/2024\/06\/Clearer-lin-2.webp 1792w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ghost DataCenters Floating VMs and Applications We offer you the possibility to use your own IPs, in both versions, and can assign you our own as well. Our encrypted Over-the-Top network makes it possible to employ your IPs from multiple locations, making it the ideal choice to have off-site backups of your virtual machines and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-100","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/pages\/100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/comments?post=100"}],"version-history":[{"count":10,"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/pages\/100\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/pages\/100\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/4n.is\/index.php\/wp-json\/wp\/v2\/media?parent=100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}