Benefits of an AWS Connection at 165 Halsey Street

By now, you’ve likely heard that 165 Halsey Street has established a dedicated network connection from its premises to Amazon Web Services (AWS) Direct Connect. This is certainly an important capability for 165 Halsey Street’s current and future tenants, but it is a possibility that folks may have some questions about our latest announcement, so we’ve drafted the below as a sort of FAQ (Frequently Asked Questions).

What is AWS?

Amazon Web Services, AWS, 165 Halsey Street, Connectivity, Direct Connect

Amazon Web Services (AWS) is a subsidiary of that provides on-demand cloud computing platforms to individuals, companies and other organizations via a paid subscription. A multitude of solutions are accessible via AWS, such as compute, storage, database, migration, network and content delivery and a whole lot more.

What is AWS Direct Connect?

AWS Direct Connect allows for easy access from your premises to AWS. Direct Connect establishes private connectivity between AWS and a given data center, office or colocation space and grants facilities and their tenants the ability to access all AWS solution offerings.

How does a connection to AWS benefit current and future 165 Halsey Street tenants?

There are actually quite a few benefits of a connection to AWS for current and future 165 Halsey Street tenants. At the highest level, a connection to AWS often means reduced network costs, increased bandwidth throughput and a more consistent network experience than non-cloud, internet-based connections. Here are some of the other major benefits of note:

Speed & Privacy: AWS Direct Connect enables customers to establish private data connections to AWS that bypass the Internet. Avoiding public networks improves performance, reduces costs, increases privacy and ensures consistent throughput.

Bandwidth Cost Reduction: AWS Direct Connect reduces network costs into and out of AWS in two ways. First, by transferring data to and from AWS directly, reducing your bandwidth commitment to the Internet service provider.  Second, while inbound data transfer to AWS is not charged, outbound data transfer from AWS is charged at the reduced AWS Direct Connect data transfer rate rather than Internet data transfer rates.

AWS Compatibility: AWS Direct Connect is a network service, and works with all AWS services that are accessible over the Internet, such as Amazon Simple Storage Service (Amazon S3), Amazon Elastic Compute Cloud (Amazon EC2), and Amazon Virtual Private Cloud (Amazon VPC).

Why is a connection to AWS important for those looking into data center / colocation services?

Any enterprise that is interested in maintaining the security and control of on-premises infrastructure and deploy hybrid clouds through direct interconnection should be very excited about AWS Direct Connect because it grants dedicated, high-performance, private access to the enterprise’s AWS applications and workloads at the global level.

Want to find out more?

Contact us via email or phone, at or 212-399-3633 today. Our team is happy to discuss the above benefits and answer any questions that you have specific to your business and how AWS Direct Connect can help you succeed.

Network Security in 2018: Establishing Leadership

Thank you for reading our blog series on Network Security! This is the final of the series, and today we focus on a network security opportunity, which is establishing security leadership.

Enhancing cybersecurity is a critical move for every organization. Moreover, increasing employees’ security “IQ” is another step toward securing key corporate assets. Each organization should work together to assemble a key cybersecurity team that consists of executives who will have a cybersecurity response plan ready to go in seconds.

Being proactive versus reactive is highly important when it comes to security matters. According to the “2015 Cost of Data Breach Study,” U.S. companies were the biggest victims of data breaches worldwide.

While many organizations spend capital and extend resources upfront on security measures, they must be sure that they are investing in a response team, who will oversee response procedures in the event of a breach. This response team should consist of IT personnel, legal, human resources, management, the C-Suite and an outside cybersecurity partner (if available). This team of combined executives is essential to responding to all types of cyberattacks.

Read on this and much more in our Network Security: Challenges and Opportunities eBook here.

Having issues assembling the right cybersecurity team? Check out our “Challenge: Shortage of Skills” section of this eBook for more tips!

Network Security in 2018 – Control Via the Cloud

Happy New Year! As we enter 2018, there has never been a time more critical to focus on the latest challenges and opportunities for network security. In late 2017, we featured a blog series on network security, and continue with another post today on “Control via the Cloud.”

With the cost of a single ransomware occurrence at $713,000 on average, companies today cannot afford to NOT have cybersecurity protection. And with the technological advances made by the cloud, these businesses should also be taking advantage of the cloud.

Why? Explore these benefits of using the cloud for security:

  • Software is managed and upgraded offsite (automatic updates)
  • Lower hardware costs due to the only requirements being an internet connection and browser. Buying and constantly upgrading servers and other hardware is unnecessary.
  • Need for a large IT staff is reduced
  • Many cloud service providers claim to provide higher levels of security and uptime than typical networks

Read more about the benefit of the cloud for your network security, and download the full eBook here.

Make 2018 the year your business is more than ready than ever to tackle network security challenges.

Network Security Opportunity: Detection and Response

As part of our six-part blog series on network security, we earlier discussed the challenges around network security. Now, let’s talk opportunities, starting with detection and response.

According to Gartner, detection and response is the top security priority for organizations in 2017. To date, many companies have incorporated prevention-only approaches for cybersecurity when they really should be focused more on detection and response.  Why? Well, simply, prevention is pointless unless there are also detection and response capabilities to the cyber threats.

Because internal security assets are scarce, many organizations seek external help from security consultants, managed security providers and others. There is a plethora of new security detection and response services being offered on the market today. Detection and response services help organizations gain real-time visibility into all types of attacks, advanced malware, unspecified threats and/or unauthorized access occurring on SAP infrastructure and applications.

Sophisticated detection and response services can:

  • Alert when business-critical applications are under attack to reduce downtime risk
  • Protect information and processes critical to running the business
  • Proactively respond to attacks and prioritize remediation efforts

Read the full list and learn more about opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks — download the full eBook here.

Go into 2018, well prepared!

Network Security Challenge: IT Budgets

As part of our six-part blog series on network security, here is the next challenge: IT Budgets.

Budgeting for cybersecurity expenses is a concern as organizations and officials push to expand these budgets as well as capabilities of existing security teams. When it comes to cybersecurity spending, there is no “magic number.” It’s best to first consider the following:

  • Updating Legacy Systems. Many business systems remain woefully outdated. Because modernization projects are a huge undertaking cost- and time commitment, IT teams should find ways to provide additional security for the legacy systems, such as through intrusion detection systems (IDS) or security information and event management (SIEM). IT management should decide whether a partial or full upgrade to the systems are needed, weighing risks.
  • Network Security Appliances. Assess the different security appliances available, factoring in capital costs, employee skill and time needed to research solutions and install them.
  • Lower Cost Solutions. Active Directory® password requirements, differentiating reused passwords and service accounts, segmenting internal networks, reviewing group memberships, and restricting share permissions can all have a positive impact on security, but what must be considered is that these lower cost options can take long hours to complete.

Read the full list and more about the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks — download the full eBook here.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned for more.

Thanks for reading!

Network Security Challenge: Shortage of Skills

Download Our New eBook

As part of our six-part blog series on network security, we now focus on the next challenge: Shortage of Skills.

The cybersecurity industry is a rapidly growing, multi-billion-dollar-plus market, but it’s facing a serious talent shortage. Recent reports from Frost & Sullivan,  (ISC)2 , and Foote Partners highlight  the lack of cybersecurity talent and shortage of skilled technology workers. The reports project that the global cybersecurity workforce will grow to six million by 2019, but there will be more than 1.5 million of the positions unfilled by 2020.

So, what can companies do? Here’s a quick list – and for more on the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks, download the full eBook here.


  •  Assess workforce strategy
  • Improve outreach and engagement.
  • Build an ecosystem of professionals focused on cybersecurity.
  • Provide an amazing support program for the new hires.
  • Support ongoing learning and skill building.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned each week for more!

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!

Network Security Challenge: Evolving Attack Vectors

Download our new eBook

As part of our six-part blog series on network security, let’s focus today on our first challenge: Evolving Attack Vectors

Malicious people and organizations use a variety of methods to attack individuals and enterprises. With each attack more sophisticated than the prior, there are three main types of attack vectors that lead to various types of cybersecurity breaches:

Phishing Attacks A phishing attack occurs when a malicious person(s) attempts to impersonate a legitimate person or corporation through an email that asks the user to provide critical data or information needed to access certain accounts.

SQL Injection Attacks Structured query language (SQL) is a programming language used to deal with back-end databases and applications. If a company web developer creates an application where the user can interact with a database to add information—and does not take proper precautions—attackers can easily perform a “get request” or “select request” function, which dumps the entire database so they can harvest sensitive information.

DDOS Attacks

Distributed denial-of-service (DDOS) attacks impact information availability and occur when a malicious person(s) creates a slew of traffic requests on a website at once in order to crash it or severely cripple it for a set amount of time. Many websites are still not equipped to handle the kind of traffic that attackers can harness using botnets, making these sites highly susceptible to DDOS attacks.


Training of employees is critical in order to educate and increase awareness on common hacking methods used to put valuable data at risk. Much damage can be prevented with education and ensuring proper prevention systems (such as DDOS protection from web hosting companies) are in place to thwart these kinds of attacks.

Learn more about the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks in our new ebook, “Network Security: Challenges and Opportunities for 2017/18,” available for free download here.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned each week for more!

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!

Network Security: Challenges and Opportunities for 2017/18

Download our new eBook

Per Gartner*, worldwide spending on information security is expected to reach $90 billion in 2017. The topic of cybersecurity remains one of the hottest in the tech and telecom industries today. A critical issue that spans the world, there remain several challenges, including a shortage of skills and lack of total control. Fortunately, with the focus so strongly on cybersecurity, leaders continue to take the reins in exploring the technologies and techniques needed to successfully confront cyberattacks.

We are excited to introduce to you our newest eBook, “Network Security: Challenges and Opportunities for 2017/18” available for free download here.

In this ebook, we review the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks.

As part of our new eBook offering, we will share with you excerpts in a six-part blog series on network security – challenges and opportunities. Stay tuned each week for more!

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!



165 Halsey Street: 1.2 Million Square-Feet of Data Center Excellence

165 Halsey Street has been providing tier-1 data center and colocation services for almost two decades. Over the years, some of the largest names in the technology, finance, medical, education, content, and government industries have turned to us for their connectivity needs.

So, what’s our secret? We’ve built one of the finest facilities in the country, strategically located on the outskirts of the New York Metropolitan area in Newark, NJ. Below are some of the key specs that set us apart from other data centers:

Seven Distinct & Redundant Points of Entry

165 Halsey Street offers seven distinct points of entry for fiber. This is critical because it provides an extremely high level of redundancy that safeguard against outages; keeping data center services up-and-running at all times. If a particular fiber line has an outage, there are six other entry points into our building that ensure our data center is connected at all times.





165 Halsey Street is home to more than 60 prominent network operators, allowing you to access the connections you need. What’s more, 165 Halsey Street does not charge “cross-connect” fees, and guarantees a 48-hour turnaround for the implementation of a cross-connect request, allowing customers to get the highest value out of their colocation services.

Take a look at the growing list of networks you can gain access to at 165 Halsey Street.




Without the appropriate level of power, none of this is possible! 165 Halsey Street draws power from its nine power vaults located securely in the building’s basement. The building offers over 80 mW of power






165 Halsey Street was built on a company-wide commitment to provide quality datacenter, telcom and colocation space with a personal touch. The owners of the building also own the colocation business, meaning there is no bureaucracy or “re-tape” to delay customer requests. Our team is available 24/7/365.

Click here to learn more about our remote hands capabilities.




Last, but far from least, 165 Halsey Street employs an on-duty 24/7/365 security staff. All building perimeter points are secured by state-of-the-art alarm systems and tenants are able to control access to their floors with card key access.





But that’s not all! View our infrastructure infographic to learn about our entire data center specs list.

#TEXcited for Telecom Exchange! June 20-21, 2017

In less than one week, Telecom Exchange’s doors will open at Cipriani Wall Street (June 20-21, 2017)! The 165 Halsey Street team will be on hand with an exhibit booth presence to discuss all things data center and colocation services.

Here’s a few quick facts about 165 Halsey Street:

  • We are an SSAE 16-certified carrier neutral colocation facility.
  • There are no MRC cross connect fees in our facility.
  • We grant access to 60+ top-tier networks through our facility.
  • We serve a variety of tenants, including Fortune 500 companies and SMBs across the technology, financial, government, medical, content industries.

If you’re a content provider, network provider, or tech startup in the market for colocation services, we would love to schedule some time to discuss what our 1.2M square-foot data center/colocation/ telecom carrier can do to meet your unique networking needs.


Telecom Exchange is the award-winning industry networking event dedicated to neutral exhibit space for direct networking and C-level engagement that allows attendees to explore ‘Where Communications & Technology Meet.’ This year’s show is projected to host over 600 attendees, so the 165 Halsey Street team is looking forward to catching up with old friends and meeting new.