Our Security

Our Security

AISG is the Fort Knox of clouds.

Our Security and Protection Policies.

  • SAS 70/SSAE 16 certifi ed facilities (2012 SSAE16 underway)
  • Strict security policies and procedures help our clients meet regulatory demands and compliance guidelines set forth by HIPAA, SOX, PCI, etc.
  • 365x24x7 on-site personnel and monitored video surveillance
  • Card key plus PIN to access facility
  • Card key / biometric fi ngerprint to critical areas
  • Individually locked cabinets and cages
  • Photoelectric wall beams
  • Digital cameras
  • Redundant backup power via multiple UPSs and generators
  • Redundant network infrastructure
  • Geographic diversity/redundancy

Network Security

  • Utilization of Cisco routing and switching with strict access, protecting the borders of our network, and VMware’s vShield Edge fi rewall, protecting all servers
  • Utilization of SSL VPN with two-factor authentication for all remote access
  • All storage subsystem traffi c is segmented on private isolated network to protect customer data
  • All systems are managed by named user logins with granular user access; system access is logged to a centralized logging subsystem for auditing purposes
  • Utilization of IPSEC VPNs and separate voice VLANs at the customer site to protect the privacy of all voice communications
  • Utilization of private WAN circuits between locations and IPSEC for encryption to avoid sensitive data traversing the public Internet
  • Frequent critical and non-critical system patching and upgrade cycles to ensure all systems are protected from known and identified threats

Technology Services Liability Coverage

  • Miscellaneous Professional Liability Services Coverage
  • Technology Products Liability Coverage
  • Media Content Services Liability Coverage
  • Network Security Liability Coverage
  • Privacy Liability Coverage
  • First Party Extortion Threat Coverage
  • First Party Crisis Management Expense Coverage
  • First Party Business Interruption Coverage