Financial Exposure Intelligence
⚡ Data Centre Module
← Standard Analysis
System Online
Step 01 — Data Centre Profile

Define your DC footprint

Provide basic parameters about the facility — Xylo will calibrate financial exposure ranges to your specific scale and criticality.

Step 02 — Infrastructure Map

Map your critical systems

Select the infrastructure components present in scope. Xylo uses this to model cascading failure paths and dependency exposure.

📡 Live Dependency Topology
POWER UPS / Gen ❄️ COOLING CRAC / CRAH 🖥️ COMPUTE A Primary 🖥️ COMPUTE B Secondary 🔀 CORE SW L3 Switching 🔒 FIREWALL Edge Security 💾 STORAGE SAN / NAS ⚙️ APPS Business Svc 📊 DATA SVC DBs / APIs

Click nodes to mark components at risk. Red nodes indicate single points of failure with no redundant path.

Infrastructure Present in Scope
UPS Systems
Uninterruptible power supply units
Diesel Generators
Standby generation capacity
CRAC / CRAH Units
Computer room cooling systems
Core Network Fabric
Switches, routers, patching
Fire Suppression
Gas / inert suppression systems
Physical Security / CCTV
Access control, surveillance
DR / Warm Standby Site
Geographic failover location
Out-of-Band Management
IPMI / DRAC / iLO access
DCIM Platform
DC infrastructure management software
Multi-Tenant Colo Customers
Third-party revenue-generating tenants
Step 03 — Failure Scenario

Select a catastrophic scenario

Choose the failure scenario to model. These are real-world DC failure modes with documented financial impact patterns.

● TIER-1 THREAT

⚡ Power Cascade Failure

Simultaneous UPS and generator failure during grid outage. Complete loss of facility power with no redundant path. Cooling fails within minutes.

Duration: 4–72 hrs
Freq: 1-in-25yr
● TIER-1 THREAT

❄️ Thermal Runaway / Cooling Loss

CRAC unit failure in summer peak. Inlet temperatures breach 35°C. Servers begin thermal throttling then emergency shutdown. Risk of hardware damage.

Duration: 2–48 hrs
Freq: 1-in-10yr
● TIER-1 THREAT

🔒 Ransomware — Full DC Encryption

Ransomware propagates from a management VLAN. Encrypts hypervisors, SAN, and backup targets. No clean recovery point available within RPO.

Duration: 7–30 days
Freq: 1-in-5yr
● TIER-2 THREAT

🔥 Fire Suppression Discharge

Accidental or triggered suppression discharge in active hall. Equipment survives but facility goes offline for inspection and reinstatement.

Duration: 12–96 hrs
Freq: 1-in-15yr
● TIER-2 THREAT

🌐 All-Carrier Connectivity Loss

Fibre cut or carrier network failure severs all inbound connectivity. Facility is operationally live but dark — customers and services unreachable.

Duration: 6–72 hrs
Freq: 1-in-8yr
● TIER-3 THREAT

🕵️ Physical Intrusion / Theft

Tailgating breach or insider threat. Servers or storage media removed. Regulatory notification, forensic investigation, and customer notification required.

Duration: 5–21 days
Freq: 1-in-20yr
Step 04 — Insurance Coverage

Current policy structure

Input your existing coverage. Xylo will map each policy against the selected scenario to surface gaps.

Analysing DC Exposure…
Running failure model against your infrastructure and coverage structure.