Any business that relies on the cloud knows that speed matters. That’s why we’ve engineered our solutions to meet your performance needs. Our architects and engineers have designed our cloud services to ensure you are operating in a way that is meaningful to your business’s needs.
Cloud Clarity’s data center is certified by the Uptime Institute to be a Tier III Gold design with Tier IV capabilities operating as a 24/7 operation. Your systems and data is in an SSAE 16 Type II compliant facility, contact our team to get a copy of this report yourself.
The Security in our data center requires three tokens, an access card, a retinal scanner, and a pin number to gain access to the data center floor. Our facility and perimeter are under constant video surveillance and monitored by on-premise security guards around the clock.
Internet access to our systems is handled through carrier neutral BGP routing across multiple tier 1 internet providers, using multiple redundant fiber connections, entering in different parts of the building. All of our systems are connected to the internet by completely redundant connections.
Our systems are protected by VESDA (Very Early Smoke Detection Apparatus) dry fire suppression systems. This means your systems and data are protected from even the worst disasters.
We undergo an SSAE16 Type II auditing process in our data centers to ensure our physical access requirements are met. Some of our software ensures that you are protected under your HIPAA, GLBA, SOC 1&2, and PCI-DSS regulations. Connect with us to learn more.
Cooling is handled by 30-ton CRAC units that are configured in an N+1 configuration, while multiple Xcel Energy power substations provide power. Generators are are also configured in an N+1 configuration, and our UPS system that handle both primary and backup power systems again are configured in an N+1 configuration.
HITECH
FedRAMP
PCI-DSS
HIPAA
GLBA
FIPS 140-2
FISMA
Relevant section/topic |
Compliance Requirements |
How We Can Help |
---|---|---|
HIPAA Security Rule (45 CFR Part 160, 164) |
Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network. |
|
Relevant section/topic |
Compliance Requirements |
How We Can Help |
---|---|---|
Protection of Security Technology |
Make security-related technology resistant to tampering, and do not disclose security documentation unnecessarily. |
|
Cryptographic Key Management |
Determine that policies and procedures are in place to ensure the protection of cryptographic keys against modification and unauthorized disclosure. |
|
Exchange of Sensitive Data |
Exchange sensitive transaction data only over a trusted path or medium with controls to provide authenticity of content, proof of submission, proof of receipt, and non-repudiation of origin. |
|
Security Requirements for Data Management |
Define and implement policies and procedures to identify and apply security requirements applicable to the receipt, processing, storage and output of data to meet business objectives, organizational security policy, and regulatory requirements. |
|
Relevant section/topic |
Compliance Requirements |
How We Can Help |
---|---|---|
The Financial Privacy Rule |
Financial institutions must provide each consumer with a privacy notice, explaining where the info is shared, how it is used and how it is protected, at the time the consumer relationship is established and annually thereafter. |
|
The Safeguards Rule |
Financial institutions must design, implement, and maintain an information security plan to protect customer information; it also applies to credit reporting agencies, appraisers and mortgage brokers receiving info from financial institutions. |
|
Relevant section/topic |
Compliance Requirements |
How We Can Help |
---|---|---|
The Financial Privacy Rule |
Financial institutions must provide each consumer with a privacy notice, explaining where the info is shared, how it is used and how it is protected, at the time the consumer relationship is established and annually thereafter. |
|
The Safeguards Rule |
Financial institutions must design, implement, and maintain an information security plan to protect customer information; it also applies to credit reporting agencies, appraisers and mortgage brokers receiving info from financial institutions. |
|