All you have to do is use one of these three ways:
If you are our client – you can reach us from Jubilerska Street where the reception desk will provide you with a card that will authorize you to move around your colocation.
If you are a supplier/courier or you are coming to a meeting (office visit), we invite you from Mglista Street where you will undergo a security check.
Always remember to bring a photo ID with you – without this document you will not be allowed to enter the campus.
Send us a short e-mail at firstname.lastname@example.org. Provide the engineer’s data in the e-mail, i.e. their first name, last name, and ID number. Enter the date and time of the visit and the car details: brand and registration number if the engineer needs a parking space. The visit is always authorized by phone with the person managing the server room access list.
Yes. Mail must be reported in advance by sending an e-mail at: email@example.com. In the e-mail, provide the expected date of receipt and include information on whether your company’s employee will pick up your mail or if you want our engineers to do that (service upon additional fee as per the Remote Hands price list). Attach the waybill to the e-mail.
Yes, but it is necessary to send a request at firstname.lastname@example.org in order to arrange the date of taking photos. Ask a Customer Service employee to send you the complete procedure containing information about the data of the camera and the photographer required by us.
Customer Service Department works 24/7/365.
Send the information about the change of your company data at email@example.com. Attach the document confirming the change to the e-mail: KRS [extract from the National Court Register] or a resolution of the management board on the change of the company address/name.
When signing a contract, you can choose in advance an e-invoice instead of a traditional printed form. However, if you do not decide to do so right away, you can send us a statement of acceptance of the e-invoice at any time.
All updates of the lists containing contact details of persons authorized to enter colocation on the lists or persons designated to receive notifications related to the operation of services should be reported by sending a new list at firstname.lastname@example.org or by editing these lists in the Customer Zone.
Please bring your ID card/passport/driving license with you. The document should correspond to the one given in the notification or on the access list. If we have a personal ID card in the system, entry will not be possible if the driving license is presented.
For dedicated servers, you can generate a duplicate invoice on your own by logging in to the panel at www.panel.atman.pl, clicking the “My invoices” tab and selecting the “Create duplicate” option next to the posted documents.
We send the duplicate invoices for other services after receiving a request at: email@example.com.
Users receive from us a free client portal (Customer Zone) where we provide service statistics, colocation monitoring, a possibility of submitting queries and orders, and viewing invoices. Access is possible after logging in to the account in a web browser on a PC, tablet or mobile phone. Users’ authorizations are expanded and limited by the person administering the Main Account designated in your company to set up user accounts and assign them the appropriate authorizations on the portal.
The rights to manage the access list for the colocation are vested in persons who, on behalf of the client, have been designated in the agreement for such management. Also, only those persons designated in the agreement have the possibility to notify visits in the colocation.
In addition to the name and surname, the number of the current identity document of the person being notified is needed to give the access right to the colocation. You can enter this number in masked form as follows:
- all letters of the series and the last three digits of the ID card number should be unmasked;
- all letters of the series and the last three digits of the passport number should be unmasked;
- First you have to physically appear in the right data center – where the service is provided. There are two locations in Warsaw:
- Atman DC WAW-1 -> 21a Grochowska St. (entry from Jubilerska St.)
- Atman DC WAW-2 -> 5 Konstruktorska St. (entry from Konstruktorska St.)
- When you are around, go to the reception point. To help you, we have prepared an overview map of both DC campuses with marked reception points.
- Once you are there, you must show the ID document whose number has been previously reported to us.
- You will receive a proximity card with which you will be entitled to visit the colocation – this card will also be used to open the passages.
- When you go through the turnstile barrier to the data center zone, you will be looked after by our employee, who will assist you on the way to your colocation. This employee will arrange your access to the devices for which you have been authorized.
Unfortunately, no. Without verification of the identity document with the information contained in the notification, we are not able to carry out the authorization and, consequently, grant the appropriate rights.
Such works should be reported to the Customer Service Department to receive a permission to carry them out. It is necessary to read the Rules for performing works at Atman and to submit an appropriate statement by all persons participating in the works.
Taking photos in the data center is regulated by procedures, please contact the Customer Service Department to get the right information.
Such persons are equipped with identifiers placed in a visible place; moreover, they are dressed in characteristic dark uniforms with the Atman logo.
The vehicle can be parked as long as you stay on the campus. The moment you leave the campus, your vehicle must leave the internal car park.
Atman Cloud is a VPC (Virtual Private Cloud) that allows each user to create and manage their own virtual server infrastructure. On one large hardware platform there are many independent, logically separated, private environments.
By use of two tools that allow you to perform all administrative tasks:
- online panel
Advanced users can also use:
- built-in Heat module and OpenStack templates
- Contra’s external IaC Clouding tool.
In addition, all recognized automation tools, such as: Terraform, Ansible, SaltStack, Puppet, have modules that integrate with OpenStack and can be used with our cloud.
Of any size – from individual virtual servers to large, complex multi-server environments.
- Subscription fee, i.e. a fixed monthly amount for ordered server resources
- PAYG – a fee for resources used, settled in arrears after each month with accuracy to one hour of the use of resources
RAM, vCore, vDisk, IPv4, licenses for paid software (e.g. Microsoft Windows).
PLN 0 (zero)
You can buy the cloud by signing a contract with Atman.
1 Gbps for each environment in Atman Cloud.
For subscription billing, Atman sets the purchased server resources in the environment as the upper limit (the so-called hard limit), and it is not possible for the user to exceed those resources.
For PAYG billing, Atman determines with the user the safe limits that may not be exceeded. However, you can change them at any time.
Atman Cloud offers two performance profiles: 1000 iops and 6000 iops per data volume.
Yes. Users can create any number of L2 internal networks by themselves.
At Atman Data Center WAW-1 in Warsaw at 21a Grochowska St.
Yes. We sign a separate data processing agreement with clients who are data controllers, and its provisions are compliant with the GDPR.
- The entire server environment is logically separated from other environments, preventing traffic from mixing between users.
- Automatic three-time replication of data collected on vDisk – on different disks.
- Edge router on which you can define traffic filtering rules in the L3 layer for the whole environment, start load balancing, and create VPN connections.
- The Security Groups tool that allows you to define L3 filtering rules for individual virtual servers or their groups.
- Built-in anti-DDoS mechanism for the entire cloud platform.
- A possibility of performing data volume snapshots.
In the case of 1.1 Gbps attack or 120 kpps packages – scrubbing (traffic cleansing: transmission of proper traffic and cutting off undesired traffic).
In the case of 1.5 Gbps attack or 1 Mpps packets – blackholing (cutting off all traffic).
No. For clients who want to use backups, we recommend the Atman Backup service.
For the file system (for Windows, Linux, FreeBSD, MacOSX operating systems) and for VMware virtual environments.
Installation packages of such agents, as well as backup plans and instructions for use are prepared on request as a “Custom Plan” for an additional fee.
Through a convenient online administration panel.
Any size – our platform will not lack space 🙂
Over the Internet.
Yes, transmission all the way agent -> platform is encrypted; also the data stored on the platform are encrypted.
Check out the price here
There are two components of the fee: the number of servers covered by the backup protection and the protected storage (counted at the source that is on your servers).
PLN 0 (zero)
At Atman Data Center WAW-2 in Warsaw at 5 Konstruktorska St.
Yes. We sign a separate data processing agreement with clients who are data controllers, and its provisions are compliant with the GDPR.
The Atman Firewall service is designed to protect against intrusions, attacks, viruses and spam.
The most important advantages and benefits of the Atman Firewall service are:
- Comprehensive protection of the interface with the Internet
- Inspection of the OSI application layer
- Possibility of working in NAT and BRIDGE modes
- Advanced security statistics (such as blocked ports and types of attacks, band saturation, etc.)
- The ability to implement secure IPSec VPN connections
- High availability of the service guaranteed by redundant operation of the system
- System maintenance by Atman specialists
- Low costs of service purchase and system maintenance
- The solution installed in Atman’s rack
The service is provided based on the Next Generation Firewall systems from the FortiGate family. It consists of the following components:
- Firewall instance made available to the client exclusively
- A data transmission service that provides a connection between the client’s firewall and the interface with the client’s infrastructure.
The client does not have to buy a data transmission service separately – it is an integral part of the Atman Firewall service.
The solution is installed in the Atman Data Center, in the DC operator’s rack. The client does not have to purchase any equipment. As part of the monthly subscription fee, the client can use the features provided by the New Generation Firewall.
The firewall protection may cover standard Internet access services, i.e.: Business Internet, Colo Internet, Basic Internet, Office Internet.
The Atman Firewall service provides protection of the basic Internet access service.
As an additional option – depending on technical capabilities – it is possible to protect the backup internet connection, purchased from another telecommunications operator. The service in this option enables the support for dynamic routing protocols, including BGP.
The firewall instance is managed by Atman specialists based on the orders received from the client.
The client has access to the administration panel in the read-only mode that allows to:
- View the status
- View logs and reports
- View the current firewall configuration.
We guarantee standard SLA with the service availability is at the level of 99.9%.
Notifications are handled by the Atman Network Operations Center (NOC) in accordance with the notification and escalation procedure set out in the Agreement. Notifications are accepted 24/7/365.
Typically, it takes 7 business days to start the service and it includes:
- Setting up the data transmission service from the firewall to the interface with the client’s infrastructure
- Preparing the firewall instance and making the initial firewall configuration. Signing the service acceptance report.
Due to the specificity of the service, it is not possible to run the service so that it could undergo free testing – an individual configuration for the client takes several hours of engineer’s work and requires the allocation of firewall resources.
However, you can start the service to run monthly paid tests.
1. protects against a specific type of external attack: Distributed Denial of Service:
- a DDoS attack consists in flooding the client’s network to block traffic (block the link) and thus cutting it off from the Internet.
2. The purpose of the Anti-DDoS system is to redirect all traffic to the “side track”, filter out this malicious traffic (intended only to saturate the link) and pass the correct traffic.
3. The system consists of:
- Sensor – used to analyze traffic and make decisions when to redirect it
- Filter – which is a simple firewall, but with the ability to filter large amount of traffic (simple in the sense that it only filters, but does not have DoS, AV or IPS functions)
- It works on both sides: it protects the network against unwanted incoming traffic, but it can also block outgoing traffic (from the client).
Atman Anti-DDoS and Atman Firewall services have different functions and different tasks. They differ so much that one cannot replace the other, but they complement each other.
Yes, Atman Firewall works “inline”. It is treated like any other active device in the Atman network. Its load will affect the quality of the Internet connection – communication with the world.
Clients for Dedicated Servers are protected by a dedicated, comprehensive, fully automated anti-DDoS solution. It includes both the appropriate network infrastructure – redundant, high-bandwidth connections – as well as systems responsible for recognizing and filtering attacks.
The filtering subsystem tries to eliminate attacks to minimize the disruption of normal network traffic of the host under attack. Firstly, the interfaces through which the attack is carried out are identified, and the filtering mechanisms are activated only on the attacked links.
All servers are covered by the basic protection against DDoS attacks included in the price. In addition, we offer plans for more demanding clients:
Through the IPMI (Intelligent Platform Management Interface). It is a device installed on the server’s motherboard, giving the possibility of remote connection to the server, bypassing the operating system. Users has full access to the server screen, keyboard, mouse. They can remotely turn the server on or off or reset it. They can also connect any ISO or CD-ROM file from their own computer and upload it to the server, e.g. to reinstall the operating system or the virtualization software. All communication with the server is encrypted and protected against third-party interference. The IPMI console can be activated by selecting the ‘IPMI” option in the “My servers” tab in the Customer Panel.
Yes, you can install any operating system using the IPMI, and connect your own disk image to the server. ATM does not provide support for systems installed by the clients for the service.
System installation with the use of IPMI is in no way different from the standard system installation performed with physical access to the machine. See e.g. Supermicro IPMI Virtual Media + Centos.
IPMI allows full remote management of the server, including changing the BIOS settings, starting the computer from the remote media, capturing the screen, mouse, keyboard, as well as remotely restarting and shutting down the server by cutting off the board power supply.
For security reasons, access to the IPMI console activated in the Customer Panel is active for 8 hours from the moment the console is started. After this time, the connection is cut off automatically. We encourage you to disable the IPMI access yourself after finishing work – the appropriate button will appear in the Customer Panel after activating the access.
Within a month you can use the IPMI function many times, the number of connections is unlimited.
Yes, we provide server administration service; however, each time we make a separate valuation depending on the complexity of the task and the required response times. Administrative work can be valued hourly (according to the rate given in the price list) or a flat rate basis.
To agree the terms and conditions of this service, please contact the Customer Service Department.
Yes, servers can be connected with an internal network. Such network is configured on a separate network interface, it operates independently from the Internet connection and enables free data exchange between servers, without loading the link. Traffic in the internal network is not included in the monthly transfer limit. In order to start the service, the “internal network” option should be selected in the Customer Panel for each server that is to have access to such network.
No, the FTP server is located in a dedicated network segment and cannot be connected to the client’s private network.
The motherboards used by us are equipped with a hardware SATA RAID controller. By default, Linux and Windows installations are configured with software RAID, but the clients can independently reconfigure their server using the IPMI in such a way that they use a hardware controller.
For clients in need of more efficient configuration, we are able to provide servers with an additional, more efficient RAID controller – those interested please contact our Customer Service Department.
It is not possible to insert your own devices into the rooms of Dedicated Servers. However, it is possible to:
- lease a dedicated server and put it into your colocation located in the Atman DC, or
- connect a dedicated server with the devices in such colocation or with resources in Atman Cloud through an inter-service link.
Contact the Customer Service Department for details.
The best way to report a failure is to use the “Submit Notification” button in the Customer Panel (“Dedicated Servers” tab, button at the server card) – thanks to this our technical service will receive precise information that will significantly speed up the removal of the problem. In this way, failures can be reported around the clock and they are prioritized.
During the office hours, you can also report a failure by phone, by contacting our Customer Service Department.
The intervention will be completed in accordance with the SLA applicable to the given service.
Call or send an e-mail to the Customer Service Department as soon as possible. If this is an incidental matter then the server will be conditionally unblocked. It is possible to recover a blocked server within 14 days of blocking it.
By default, up to 20 IPv4 addresses can be attached to each server.
If you need more addresses, please contact the Customer Service Department.
Standard configurations available on our website are installed earlier and are waiting in racks for customer orders. As a result, they can be started immediately, 24 hours a day, 7 days a week – after the payment confirmation. If you have chosen the option to install the operating system yourself, the server will be available immediately after confirming the payment. If you have chosen a server with a pre-installed system, it will take about one hour (Linux) to one business day (Windows) to run the server.
The deadline for running custom configurations delivered to order is typically up to 2 weeks and is determined by the service at the time of order confirmation.
By default, servers are billed on a monthly basis. It is possible to obtain other billing periods on request by contacting the Customer Service Department.
Yes. In addition to the dedicated server service, you can purchase server administration, backup policy administration, software security audit, order configuration of the system and security measures and other administrative services settled with a lump sum or on an hourly basis.
To agree the detailed terms and conditions, please contact the Customer Service Department.
The price list of new services presented on the website may change over time. The price of services already launched for which no fixed-term agreements have been concluded may change only if any external factors occur that materially affect the costs of providing the service. The prices of services for which long-term agreements have been concluded are valid for the entire duration of the agreement.
All restrictions on the use of dedicated servers are described in the “Dedicated Server Services Regulations” available here. The basic principle stated there is that the Polish laws must be complied with. However, we do not introduce technical or business restrictions on the use of servers: you can install any software on them and provide any services using it – as long as it’s lawful.
If you want the traffic between your servers not to be included in the transfer limit, we recommend purchasing an internal network service. All outgoing traffic from the server to the Internet, except for traffic directed to the backup server (FTP service), is included in the statistics and counted towards the transfer limit.
The price for the standard service of dedicated servers is already very attractive, but if you order more than 10 servers, you can get additional discounts; information is provided by the Customer Service Department. For regular clients we have also prepared discounts related to the duration of the server lease.
For standard services, the server repair is carried out within 24 hours from reporting the failure. If the client purchased an additional, higher level SLA, the repair takes place within the time specified for the additional service. If the failure is not critical (e.g. failure of one of the disks), the repair is carried out at the time agreed by both parties. All infrastructure elements – except the server itself – are fully redundant, which allows to ensure high availability guaranteed in the SLA.
Payments for server services are settled via an external electronic payment system. Our system automatically downloads information about payments made from through this system. If the money has been transferred but has not been credited, you must clarify the situation with the payment provider.
After ordering the Custom Server, our employee will contact you to clarify any technical uncertainties and determine the date of activation. Non-standard orders are usually implemented within a few to several days.
If you have ordered an online service and want to opt out, simply contact our Customer Service Department. Your server will be blocked and disabled, and the agreement terminated after the end of the current billing period, in accordance with the Rules.
The issue of terminating signed agreements is described in the Rules which was also attached to the agreement.
If the customer uses leased servers from an external service provider to process personal data, to comply with the requirements of the Act on Personal Data Protection it is required that certain conditions are met by the devices, infrastructure and service provided by such service provider. The service of Dedicated Servers provided by ATM SA allows you to meet the requirements of the Act on Personal Data Protection in the scope of infrastructure, its location and physical organization of access to the server room.
At the request of clients, ATM provides detailed information on the infrastructure used to provide the service, necessary for the client to develop a proper security policy. Additionally, it is possible to sign a processing agreement with ATM (template available on request).
By default, the service of Dedicated Servers is sold in electronic form, without signing an agreement on paper. Nevertheless, the service provider and the client are bound by a valid civil law agreement that is concluded when the service is purchased. The agreement is based on the Rules which is accepted by the client in the process of purchasing the service. This contract is valid and binding for both parties from the point of view of the Polish law.
It is possible, however, currently this procedure for agreement conclusion is not supported in the automatic purchasing process. In such case, due to the need to exchange documents in paper form, please contact the Customer Service Department.
Atman services are available only to business entities with assigned NIP and REGON numbers. At present, there is no possibility for individual clients – who do not have registered business activity – to buy the service.
By default, payments for services are handled using an electronic payment system. It allows you to make an automatic transfer from most Polish banks offering online banking, as well as make a payment by credit card. However, if for any reason you cannot make an automatic payment, you can make a transfer. You can then make a payment at the post office or online by entering the transfer details into your online banking system. Pay special attention to providing the transaction number in the transfer title. Payments made in this way are not credited automatically – their service can take up to 48 hours (on business days), and you will get access to the server service only after payment is credited.
You can join Thinx at any of the following nodes:
|Warsaw||Atman Data Center Warsaw-1||Grochowska 21a|
|Warsaw||Atman Data Center Warsaw-2||Konstruktorska 5|
|Warsaw||LIM Marriott||Aleje Jerozolimskie 65/79|
|Gdańsk||Ship Design and Research Center (CTO SA)||Wały Piastowskie 1|
|Gliwice||Tauron||Wybrzeże Armii Krajowej 19|
|Katowice||4 Data Center (4DC)||Adamskiego 7|
|Koszalin||Koszalin University of Technology (Politechnika Koszalińska)||Śniadeckich 2|
|Kraków||Grupa Onet.pl||Bobrzyńskiego 12E|
|Kraków||Netia||plac Matejki 12|
|Łódź||Red Tower||Piotrkowska 148|
|Płock||Zakład Energetyczny Płock||Graniczna 79|
|Poznań||Beyond/Stary Browar||Półwiejska 42|
|Poznań||Poznań University of Economics and Business (Uniwersytet Ekonomiczny)||Powstańców Wielkopolskich 16|
|Wrocław||Sky Tower||Powstańców Śląskich 95|
Atman E-Line is a range of fast, fully managed high-capacity services based on Ethernet technology in accordance with the IEEE 802.3 standard, terminated at a Fast Ethernet or Gigabit Ethernet interface.
Ethernet standard services are a popular technology commonly used in local networks, and increasingly often also to connect geographically remote locations.
The Ethernet standard provides a basis for the implementation of many technologically advanced services related to access to server resources or the Internet.
The Atman E-Line service is available in two variants:
Lambda is a service that connects two locations using infrastructure with high channel capacity, because it is based on a dedicated optical digital channel. The types of Lambda service available in the Atman network are LAN (with bitrates of 1 Gbps, 10 Gbps), WAN (STM-16, STM-64) and FC (4G, 8G). A Lambda setup guarantees the customer’s exclusive access to the whole of the bandwidth, and the highest level of transparency for transmitted data.
The Lambda service is an ideal proposal for ISPs, network operators and large companies requiring a fast, economical network connection.
SDH type data transmission services are synchronous services based on an SDH backbone. They enable the creation of a synchronous SDH digital channel.
The technology was created as a development of the PDH standard. The system’s basic unit is an STM-1 transport unit with transmission rates of up to 155 Mbps, which enables easy interoperation with a plesiochronous PDH network with a transmission rate of 140 Mbps.
- Nationwide access – use of the backbone network and radio and cable access links
- Individual choice of capacity – we provide a guaranteed link capacity as well as the possibility of increasing it at short notice
- SLA guarantees
- Comprehensive service – the network is fully monitored and managed by Atman
The MPLS IP-VPN solution is based on MPLS (Multiprotocol Label Switching) technology using the IP protocol and the secure, isolated MPLS backbone network. Thanks to priorities assigned to particular types of information, we can guarantee transmission parameters of appropriate quality. For example, a company sending important data (such as accounting documents) can be certain that these will take priority over e-mail or Internet access.
- Symmetric access connections based on optical fiber, copper wire or radio technology
- Every line terminates at a router managed by qualified Atman engineers
- Support for up to five classes of service
- Bandwidth allocation selected flexibly to match the customer’s solution
- Ability to create a backup connection using a GSM network
The Atman MACSec service is provided based on a pair of switches that support the 802.1AE standard. They are located at the end locations to which the service is delivered. Their configuration uses the MKA protocol on WAN/uplink interfaces. The devices authenticate each other with a PSK key identical and exclusive for both devices. After successful authentication, the switches proceed to SAK session key negotiation. One of the devices is also the SAK key server and is responsible for changing the session key after the configured session lifetime (e.g. every 1 hour).
In the event that for some reason the session key is not negotiated, the devices will immediately stop transmitting data, ensuring that they are not sent in an open manner (cleartext).
Deep Security is an agent-type service, i.e. the agent must be installed for each protected server. The agent sets up a connection with the server, therefore it is not required to open firewalls for inbound traffic. Just make sure the servers with the agent installed have access to the Internet.
Before installing the agent, you must generate the installation script for the given type of operating system. All the installation steps are described in detail in the onboarding material that we provide to anyone interested.
The Deep Security service is managed through a convenient management console located in the professional Atman Data Center WAW-1. All Deep Security tools are managed from only one console. In addition, we provide onboarding material and specialist support.
After purchasing a license for Deep Security, the client receives a login and password to access the console. Using it, the client can independently manage security policies or outsource the configuration of policies to specialists.
No, it is not necessary. The Deep Security service is available to anyone who wants to protect their server environment, regardless of its location.
Each of the three Deep Security modules is priced separately so that you can order them independently. The price specifies the cost of the monthly license for the given Deep Security module for one protected server.
When ordering licenses for all three Deep Security modules, a special price per package (per server) applies.
Payments for the Deep Security service are made on a monthly basis.
Yes, we provide a free trial month to test the Deep Security service for up to five machines (servers). Contact us to test the service.
ZDI is a team of researchers (part of Trend Micro) that identifies security vulnerabilities and holes in systems and applications. The Virtual Patching tool regularly uses the ZDI database, checking for new vulnerabilities and applying the appropriate patch.
Trend Micro estimates that clients that use Deep Security receive a security patch on average 61 days faster than the companies relying only on updates from the manufacturer.
Yes, it’s one of the biggest advantages of Virtual Patching. This solution is ideal for companies using outdated operating systems that are no longer supported by the manufacturer, i.e. no new updates have been developed for them. By applying own patches, Trend Micro allows you to safely use the older version of the operating system until you switch to a newer version supported by the manufacturer, or for as long as you need it.
Click the “Join us” button at the top of this page and fill out the form. We will contact you within 24 hours.
No, you do not pay anything for being an Atman partner, you just make money.
There is no limit – it’s up to you.
Agency, where the remuneration is payable on a one-off basis, and commission-based, where you the commission is paid every month.
You do not have to undergo any training, but you can, because twice a year we organize classroom training and – on average once a month – we run product webinars.
No, we share our knowledge for free.
Our specialists from the presales department support the partners in this process, and in more complex projects, we invite our engineers to cooperate with us.
Yes. We created a special website for partners where – in addition to price lists and information materials – there are a knowledge base, recorded webinars and other materials useful in sales.
Just sign a partnership contract with us.
Yes, in accordance with business continuity plans, Atman has implemented special activities that apply to both its employees and clients staying in the Atman Data Centers, in particular the users of backup offices, clients that use colocation services and their subcontractors.
The activities taken include:
- Resignation by ATM’s employees from business trips, participation in conferences and trainings
- Replacement of direct meetings by tele- and video conferences
- Delegating the majority of the employees to work remotely
- Division of teams responsible for maintaining the data center infrastructure into physically separated sub-teams
- Changing the rules of moving around the campus, creating an additional reception desk dedicated to colocation clients
- Dedicating the reception desk in the E building only for the users of backup offices
- limiting visits to the campus to the minimum necessary, including a temporary suspension of reference and audit visits
- Increasing the scope of the remote hands service to enable clients to carry out work remotely with the support of our on-site services
- Temporary shut-down of social rooms and kitchens in Atman Data Centers to minimize the risk of clusters of people in shared parts of the buildings
- Regular disinfection of door handles, locks, taps, handrails, elevator buttons, countertops and desks.
Yes, but the entry for colocation visits is from Mglista Street, and the entrance to the backup offices – from Jubilerska Street.
In the current situation, it is not possible to park the car on the campus.
We monitor the situation on an ongoing basis and adapt our operational regulations accordingly. We currently allow client visits to Atman Data Centers, but only those that relate to critical work to maintain our clients’ infrastructure.
We encourage you to use the remote hands service in all other cases. We currently provide it free of charge to help our clients.
Critical visits that we currently allow must be notified, even for users on the Data Center permanent access lists.
The notification must be authorized by a person authorized to manage the access lists in your organization. Our Customer Service Department will contact the authorized person for authorization and confirm the notification of the entry to the Data Center.
Yes, we require that you have personal protective equipment (disposable gloves and masks). Entering the Data Center is only possible if they are used. Dispensers with disinfectant liquid are available at the reception desk.
The number of personal protective equipment available varies moment to moment. Our responsibility is primarily to provide masks and gloves to the operators to support staff of our Data Centers. We cannot guarantee that they will be available to the Data Center visitors. Therefore, we require you to use your own masks and gloves and limit visits only to those critical. We can perform all other work for you in the form of a remote hands service, for which we do not charge a fee.
Please provide a brief description of the planned work and consider commissioning us to perform this work as part of the remote hands service. Only critical visits are currently allowed.
The critical visit is related to work that cannot be performed by Atman’s technical services for legal, regulatory or technological reasons. An example of such visit is the need for specialist exchange of a disk array with confidential data by the authorized and eligible service of the disk array manufacturer.
Yes, however, we require notification of the shipment to our Customer Service Department. Such notification should include at least:
- The name of the sending company
- The waybill number
- The description of the content
Shipments will be processed as part of the remote hands service.
We observe increased network traffic, primarily around various types of television and CDN serving mainly video, as well as online gaming services. Our infrastructure is fully prepared to handle the increased traffic volume. We regularly review the infrastructure for trouble-free management of data traffic increase and make upgrades, if necessary. What’s more, we always keep at least 25% extra production capacity.
The Atman network backbone is designed redundantly; our backbone network capacity with uplinks can take several times more traffic than the one we are currently transporting.
If you have any problems accessing the Internet at home, contact your direct internet service provider.
Atman’s key technical teams work in the office and in the data center to efficiently implement technical orders. Commercial teams responsible for sales service and handling commercial orders work remotely, but to the full extent. We encourage you to contact our account managers or customer service departments in the regular way. We strive to meet the needs of our clients and to increase bandwidth as soon as possible.
Atman provides services only to business clients. If the ordering party and the payer is a company and it is technically possible to provide the service in the indicated location, there is, of course, such possibility.
We do not sell directly to individual customers.
Yes, we provide the Backup Office services all the time. Atman’s coordinators are in constant contact with the coordinators appointed by our clients and – in the working mode – determine the proceedings adequate to the existing situation. We follow its development on an ongoing basis and emphasize that all parties work together on a partnership basis to ensure the best and safest working conditions for everyone.
Yes, the Atman’s coordinator can ask all client’s employees on the campus to complete a medical questionnaire, and the client coordinator to declare that the client’s employees on the campus have not had contact with an infected person, have not been in high-risk countries, and have no COVID-19 symptoms.
Yes, due to the current situation and the increased use of backup offices, we ask you to notify you employees’ visits each time. The employees of the Customer Service Department will invite you to arrive at a specific time, according to the schedule they run, so as to avoid servicing several large groups of our clients at the same reception desk, and prepare the entrance passes in advance. If the backup office has been called up for continuous emergency operation, it is sufficient to provide the first notification with information about continuous operation as well as the start and end date, list of employees and indication of the coordinator.
If the backup office has been called up for continuous emergency operation, your employees are responsible for their passes throughout its duration and do not return them every day. Your coordinator will receive all prepared cards and provide them to the notified employees (we want to minimize the time of your employees’ stay at the reception desk).
If a backup office was called up without information about continuous operation, each time the passes must be collected and returned when leaving the campus. Our employees disinfect all passes and lanyards before issuing them to another client.
In the common areas, Atman’s employees take care of cleanliness, while in clients’ rooms – the client using a given backup office is responsible for cleanliness.
The reception desk for backup office clients is located in the E building, entrance from Jubilerska Street.