Proud to Welcome ExteNet Systems and Planet Networks!

ExteNet Systems, a leading provider of converged communications infrastructure enabling advanced cellular, wireless and broadband connectivity across urban and rural America; and Planet Networks, a premier managed technology and infrastructure solutions provider, have joined the 165 Halsey Street data center facility family.

When ExteNet Systems was faced with who to choose as its colocation provider to efficiently and effectively operate multi-carrier (neutral host) and multi-technology distributed networks, it was an easy choice to select 165 Halsey Street. As a colocation provider, 165 Halsey Street is able to ensure that ExteNet’s multiple wireless service providers (WSPs) can carry out their 3G and 4G LTE wireless voice and data services.

Furthermore, Planet Networks provides managed technology and infrastructure solutions. In order to enable its clients to grow and thrive while minimizing risk, the right colocation provider was a must.

Thank you ExteNet Systems and Planet Networks for choosing 165 Halsey Street!

At 165 Halsey Street, we exceed our companies’ colocation and infrastructure needs, offering no monthly recurring cross connect fees between customers, allowing safe, convenient and affordable interconnection.

For more information about 165 Halsey Street, visit or take the video tour.

2018 Data Center Trends: DataOps

Last month, we released a new e-book, “The Data Center in 2018: New Technologies and Trends,” and it is available for download now.

We’re kicking off a six-part blog series highlighting aspects of the e-book, and the first one starts with DataOps, a big trend for 2018 that is gaining traction, especially within large enterprises. A play on the name DevOps, the practice refers to the integration of software development (“dev”) and operations (“ops”). But, while sharing some of the goals of DevOps, DataOps is distinct and indicative of some of the major shifts we are observing today.

Tamr, a data unification company’s blogger, Andy Palmer defines DataOps as: a data management method that emphasizes communication, collaboration, integration, automation and measurement of cooperation between data engineers, data scientists and other data professionals.

Want to learn more on this and other hot 2018 data center trends and technologies? Download our newest e-book today.

The Data Center in 2018: New Technologies & Trends

2018 has already brought a plethora of new technologies and trends in regard to the data center. The question is, do you have the right colocation / data center provider on your side?

An IDC study predicts that by 2020, we’ll have 44 zetabytes of data worldwide, as compared to just three exabytes in 1986. That’s a whole lot of data! Data is the leverage point for competitive advantage across industries, and is used to enhance customer experience, increase operational efficiencies, and/or generate new sources of revenue.

It is with great excitement that we announce and introduce our newest e-book, “The Data Center in 2018: New Technologies & Trends” available for free download here.

In our newest e-book, we will take a look at the top technology trends rising to the top for data centers in 2018. 

165 Halsey Street offers enterprises increased security, reliability, scalability and cost savings. The 165 Halsey Street facility is designed for continuous IT equipment operation. 165 Halsey Street is the colocation business with no MRC cross connect fees that help businesses operate seamlessly and cost effectively.

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!


Benefits of an AWS Connection at 165 Halsey Street

By now, you’ve likely heard that 165 Halsey Street has established a dedicated network connection from its premises to Amazon Web Services (AWS) Direct Connect. This is certainly an important capability for 165 Halsey Street’s current and future tenants, but it is a possibility that folks may have some questions about our latest announcement, so we’ve drafted the below as a sort of FAQ (Frequently Asked Questions).

What is AWS?

Amazon Web Services, AWS, 165 Halsey Street, Connectivity, Direct Connect

Amazon Web Services (AWS) is a subsidiary of that provides on-demand cloud computing platforms to individuals, companies and other organizations via a paid subscription. A multitude of solutions are accessible via AWS, such as compute, storage, database, migration, network and content delivery and a whole lot more.

What is AWS Direct Connect?

AWS Direct Connect allows for easy access from your premises to AWS. Direct Connect establishes private connectivity between AWS and a given data center, office or colocation space and grants facilities and their tenants the ability to access all AWS solution offerings.

How does a connection to AWS benefit current and future 165 Halsey Street tenants?

There are actually quite a few benefits of a connection to AWS for current and future 165 Halsey Street tenants. At the highest level, a connection to AWS often means reduced network costs, increased bandwidth throughput and a more consistent network experience than non-cloud, internet-based connections. Here are some of the other major benefits of note:

Speed & Privacy: AWS Direct Connect enables customers to establish private data connections to AWS that bypass the Internet. Avoiding public networks improves performance, reduces costs, increases privacy and ensures consistent throughput.

Bandwidth Cost Reduction: AWS Direct Connect reduces network costs into and out of AWS in two ways. First, by transferring data to and from AWS directly, reducing your bandwidth commitment to the Internet service provider.  Second, while inbound data transfer to AWS is not charged, outbound data transfer from AWS is charged at the reduced AWS Direct Connect data transfer rate rather than Internet data transfer rates.

AWS Compatibility: AWS Direct Connect is a network service, and works with all AWS services that are accessible over the Internet, such as Amazon Simple Storage Service (Amazon S3), Amazon Elastic Compute Cloud (Amazon EC2), and Amazon Virtual Private Cloud (Amazon VPC).

Why is a connection to AWS important for those looking into data center / colocation services?

Any enterprise that is interested in maintaining the security and control of on-premises infrastructure and deploy hybrid clouds through direct interconnection should be very excited about AWS Direct Connect because it grants dedicated, high-performance, private access to the enterprise’s AWS applications and workloads at the global level.

Want to find out more?

Contact us via email or phone, at or 212-399-3633 today. Our team is happy to discuss the above benefits and answer any questions that you have specific to your business and how AWS Direct Connect can help you succeed.

Network Security in 2018: Establishing Leadership

Thank you for reading our blog series on Network Security! This is the final of the series, and today we focus on a network security opportunity, which is establishing security leadership.

Enhancing cybersecurity is a critical move for every organization. Moreover, increasing employees’ security “IQ” is another step toward securing key corporate assets. Each organization should work together to assemble a key cybersecurity team that consists of executives who will have a cybersecurity response plan ready to go in seconds.

Being proactive versus reactive is highly important when it comes to security matters. According to the “2015 Cost of Data Breach Study,” U.S. companies were the biggest victims of data breaches worldwide.

While many organizations spend capital and extend resources upfront on security measures, they must be sure that they are investing in a response team, who will oversee response procedures in the event of a breach. This response team should consist of IT personnel, legal, human resources, management, the C-Suite and an outside cybersecurity partner (if available). This team of combined executives is essential to responding to all types of cyberattacks.

Read on this and much more in our Network Security: Challenges and Opportunities eBook here.

Having issues assembling the right cybersecurity team? Check out our “Challenge: Shortage of Skills” section of this eBook for more tips!

Network Security in 2018 – Control Via the Cloud

Happy New Year! As we enter 2018, there has never been a time more critical to focus on the latest challenges and opportunities for network security. In late 2017, we featured a blog series on network security, and continue with another post today on “Control via the Cloud.”

With the cost of a single ransomware occurrence at $713,000 on average, companies today cannot afford to NOT have cybersecurity protection. And with the technological advances made by the cloud, these businesses should also be taking advantage of the cloud.

Why? Explore these benefits of using the cloud for security:

  • Software is managed and upgraded offsite (automatic updates)
  • Lower hardware costs due to the only requirements being an internet connection and browser. Buying and constantly upgrading servers and other hardware is unnecessary.
  • Need for a large IT staff is reduced
  • Many cloud service providers claim to provide higher levels of security and uptime than typical networks

Read more about the benefit of the cloud for your network security, and download the full eBook here.

Make 2018 the year your business is more than ready than ever to tackle network security challenges.

Network Security Opportunity: Detection and Response

As part of our six-part blog series on network security, we earlier discussed the challenges around network security. Now, let’s talk opportunities, starting with detection and response.

According to Gartner, detection and response is the top security priority for organizations in 2017. To date, many companies have incorporated prevention-only approaches for cybersecurity when they really should be focused more on detection and response.  Why? Well, simply, prevention is pointless unless there are also detection and response capabilities to the cyber threats.

Because internal security assets are scarce, many organizations seek external help from security consultants, managed security providers and others. There is a plethora of new security detection and response services being offered on the market today. Detection and response services help organizations gain real-time visibility into all types of attacks, advanced malware, unspecified threats and/or unauthorized access occurring on SAP infrastructure and applications.

Sophisticated detection and response services can:

  • Alert when business-critical applications are under attack to reduce downtime risk
  • Protect information and processes critical to running the business
  • Proactively respond to attacks and prioritize remediation efforts

Read the full list and learn more about opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks — download the full eBook here.

Go into 2018, well prepared!

Network Security Challenge: IT Budgets

As part of our six-part blog series on network security, here is the next challenge: IT Budgets.

Budgeting for cybersecurity expenses is a concern as organizations and officials push to expand these budgets as well as capabilities of existing security teams. When it comes to cybersecurity spending, there is no “magic number.” It’s best to first consider the following:

  • Updating Legacy Systems. Many business systems remain woefully outdated. Because modernization projects are a huge undertaking cost- and time commitment, IT teams should find ways to provide additional security for the legacy systems, such as through intrusion detection systems (IDS) or security information and event management (SIEM). IT management should decide whether a partial or full upgrade to the systems are needed, weighing risks.
  • Network Security Appliances. Assess the different security appliances available, factoring in capital costs, employee skill and time needed to research solutions and install them.
  • Lower Cost Solutions. Active Directory® password requirements, differentiating reused passwords and service accounts, segmenting internal networks, reviewing group memberships, and restricting share permissions can all have a positive impact on security, but what must be considered is that these lower cost options can take long hours to complete.

Read the full list and more about the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks — download the full eBook here.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned for more.

Thanks for reading!

Network Security Challenge: Shortage of Skills

Download Our New eBook

As part of our six-part blog series on network security, we now focus on the next challenge: Shortage of Skills.

The cybersecurity industry is a rapidly growing, multi-billion-dollar-plus market, but it’s facing a serious talent shortage. Recent reports from Frost & Sullivan,  (ISC)2 , and Foote Partners highlight  the lack of cybersecurity talent and shortage of skilled technology workers. The reports project that the global cybersecurity workforce will grow to six million by 2019, but there will be more than 1.5 million of the positions unfilled by 2020.

So, what can companies do? Here’s a quick list – and for more on the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks, download the full eBook here.


  •  Assess workforce strategy
  • Improve outreach and engagement.
  • Build an ecosystem of professionals focused on cybersecurity.
  • Provide an amazing support program for the new hires.
  • Support ongoing learning and skill building.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned each week for more!

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!

Network Security Challenge: Evolving Attack Vectors

Download our new eBook

As part of our six-part blog series on network security, let’s focus today on our first challenge: Evolving Attack Vectors

Malicious people and organizations use a variety of methods to attack individuals and enterprises. With each attack more sophisticated than the prior, there are three main types of attack vectors that lead to various types of cybersecurity breaches:

Phishing Attacks A phishing attack occurs when a malicious person(s) attempts to impersonate a legitimate person or corporation through an email that asks the user to provide critical data or information needed to access certain accounts.

SQL Injection Attacks Structured query language (SQL) is a programming language used to deal with back-end databases and applications. If a company web developer creates an application where the user can interact with a database to add information—and does not take proper precautions—attackers can easily perform a “get request” or “select request” function, which dumps the entire database so they can harvest sensitive information.

DDOS Attacks

Distributed denial-of-service (DDOS) attacks impact information availability and occur when a malicious person(s) creates a slew of traffic requests on a website at once in order to crash it or severely cripple it for a set amount of time. Many websites are still not equipped to handle the kind of traffic that attackers can harness using botnets, making these sites highly susceptible to DDOS attacks.


Training of employees is critical in order to educate and increase awareness on common hacking methods used to put valuable data at risk. Much damage can be prevented with education and ensuring proper prevention systems (such as DDOS protection from web hosting companies) are in place to thwart these kinds of attacks.

Learn more about the challenges and opportunities surrounding keeping networks as secure as possible and thwarting cyberattacks in our new ebook, “Network Security: Challenges and Opportunities for 2017/18,” available for free download here.

We will continue our mini blog series on network security – challenges and opportunities, so please stay tuned each week for more!

Be sure to follow 165 Halsey Street on Twitter and LinkedIn as well for all company updates, including when new blogs are posted.

Thanks for reading!