EpiGrid Infrastucture Security
EPIGRID is connected Top-Tier Blended Internet Providers 256 AES Encryption Motion and Rest
System Redundancy and Fail Over Power and Cooling Redundancy 99.999% Uptime Guarantee
Many people see the benefits of cloud computing. Performance, cost savings, and reliability are very compelling but what about the security of your data, your intellectual property? This can be the critical issue that stops a well-intentioned computing strategy that could reap big benefits.
This is a valid concern and security needs to be examined closely. Not all cloud solutions are created equally.
EpiGrid is unique. We have brought together a combination of enterprise-grade procedures and a software stack that will ensure that your data is safe.
- Geolocation and Data Sovereignty
- Performance Level Guarantees
- Service Level Guarantees
- Monitors and Auditability
- Data center compliances
Hosting data with a HIPAA compliant hosting provider must have certain administrative, physical and technical safeguards in place, according to the U.S. Department of Health and Human Services.
The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.
SOC 2 and SOC3 compliant organizations utilize the 5 Trust Service Principles (TSP). Security, Availability, Processing Integrty, Confidentiality, Privacy.
The US EU Safe Harbor security framework provides a mechanism for companies to transfer personal data between the EU and the United States.
Geo-location and Data Sovereignty
These are important factors when it comes to cloud computing. Simply put, your data is subject to the laws of the land where your data resides. With a private cloud, you know exactly where your data is. This contrasts with the public cloud where those resources could be anywhere. Common public clouds include: Amazon Web Services (AWS), Microsoft, Rackspace.
Monitors and Auditability
There are two sides to the same coin. How does a public cloud provider monitor attack attempts and report if they have occurred or been breached? And how can you audit that a public cloud solution is providing the security they claim. Both of these are very difficult with a public cloud.
Private clouds are deployed inside firewalls and offer robust IT security for an organization. Since the hardware and software stacks are completely controlled with a private cloud, there is a clear advantage of security, compliance, and privacy.