Share |

Team911 utilizes the leading SaaS-based membership management software in the industry, The tool is built on a foundation that ensures your success. The technology features and security measures are of the highest quality and constantly enhanced to delivery stability and confidence.

Network Operations Center

The primary Network Operations Center (NOC) is at DataSite Orlando. DataSite is Tier III designed and SSAE 16 Type II Certified, providing the most robust IT infrastructure facility available.

  • 130,000 Square Foot Purpose-Built Data Center Fortress
  • Diverse High Voltage Substations on Separate Power Grids
  • 3 Jet Turbine Generators
  • 8.4 Megawatt Generator Plant
  • Dual Concrete Encased Fiber Duct Banks
  • Multiple Diverse UPS + Battery Rooms
  • 2,750 Ton Centrifugal Chiller Plant
  • 3N Redundant Water Supply
  • Forty Thousand Gallons of Reserve Fuel Stored Underground
  • Three Above Ground 440 Gallon Day Tanks
  • 7/24/365 On-Site Security Guards
  • Vehicle Blockades, Bulletproof Walls, Biometric + Keycard Access
  • Extensive Video Surveillance Systems
  • Redundant Fiber Providers Running BGP
  • Cisco Routing, Firewalls and Intrusion Detection Systems
  • 7x24 Service-aware Application Monitoring

Headquarters + Backup NOC Overview:

Designed with redundancies in place to ensure maximum uptime and accessibility, the backup Network Operations Center is located in Tampa and served as the primary data center facility for twelve years (1998-2010) with a historic uptime of over 99.95%.

  • OC48 Fiber Connectivity
  • Cisco Routing, Firewalls and Intrusion Detection Systems
  • Liebert Climate Control with Redundancy
  • Line Conditioning Powered By High-End APC Units
  • Redundant Power via Diesel Caterpillar Generator with Real-Time Transfer Switch
  • Actively Monitored Security with 24/7 Card-Key Access, Video and Audio Monitoring

Application Architecture and Redundancies

The applications are not only hosted within a hardened facility with many redundancies, but the network itself is supported by system redundancies of its own.

Multiple fiber providers connect the application to the Internet. These routes are monitored 24x7x365 by systems that alert Vendor engineers should an aberration be detected.

Cisco routing and firewalling optimizes and defends the network against malicious requests and alerts engineers of anomalies.

The physical servers have redundant disk subsystems, networking and power. The servers run in clusters to handle spikes in usage and provide fault tolerance should an individual node encounter a localized complete system failure. The web clusters are load balanced so web requests are processed using the most optimal nodes at any given time.

Database servers operate as clusters which allow pushing the load to a standby server should a primary server encounter a localized system failure. Data is replicated to secondary nodes within minutes of transactions being committed on the primary node. These transactions are also securely replicated to's secondary facility.

DNS is hosted in multiple geographic locations including a presence in Europe. The Vendor's DNS employs anycast addressing which routes DNS requests to the closest geographic location.

System Security

Member data is secure and inaccessible to non-members. All members must maintain a username and password for community access. Initial member registration approval can occur one of two ways. First, members can register and be manually approved via an administrative approval process. Second, non-member importation can include private member known data that will be required as part of the registration and auto-approval process.

Administrative backend accounts require a username and password and can only be managed by an administrator with account creation rights. Administrators with the right to create accounts may create as many accounts as needed, each with different administrative accessibility (i.e. member profile management, donation management, store order management, mass emailing capability, etc.).

Passwords are not stored in the database. New and changed passwords are "hashed" using industry-standard encryption techniques (SHA1 or MD5). Only hashed versions of passwords are stored. They cannot be decrypted.

Data Backup + Replication + Restore

The database systems powering the network have multiple redundancies to ensure maximum up-time. Not only does the hardware utilize physical redundancies (redundant disk sub-systems, power, network) but database instances also run as clustered configurations. In the event of a node failure a failover node can assume an active role.

Data from these systems as well as client-uploaded content are replicated locally to off-application systems as well as geographically to our remote data center in near real-time.

Data retention policies ensure data is available for emergency restoration if necessary.

Contact Us:



Phone: 512.710.8911

We're Social: