As an Amazon Web Services customer, we inherit the best practices of AWS policies, architecture and operational processes. When you replay a system in the AWS cloud, you are sharing security responsibilities with the most powerful hosting solution in the world. AWS manages securing the underlying infrastructure.
AWS is protected by extensive network and security monitoring systems. All of AWS components are continuously scanned and tested. The AWS network required a set of credentials for access, consisting of SSH public-key authentication through a bastion host using an MFA token. This access is monitored and reviewed on a daily basis by the security managers at AWS.
AWS has data centers throughout multiple geographic regions as well as across multiple availability zones within each region to offer maximum resiliency against system outages. AWS has designed its data centers to provide for any significant excess bandwidth connections. This makes sure that there is always capacity to load-balance all traffic to minimize any type of major disruption.
The AWS infrastructure meets the requirements of an extensive list of global security standards, including:
With full backups of data, we ensure the integrity of the data for all of our clients. Our team has very strict requirements for access into the database. We monitor any IP connections for strange activity and block IPs that we find to be potentially intrusive. This ensure that any client data is secure and a historical storage is in place for all clients.
The hosting is provided by a state of the art facility that is kept at maximum security. These state of the art facilities are able to keep your valuable information safe with numerous power grids, protection from surges, and facilities equipped with AC/DC backup batteries to ensure extra protection. Since the power is supplied by a commercial power feed and is backed up by a surplus of generators, you can rest easy knowing your information is in good hands.
Streamline is automatically linked to the internet backbone through multiple connections that are DS-3 or higher. Our connections are supplied by a few well know providers such as Sprint, CI, IXA, UUNet, Savvis, and Espire. Our system optimizes traffic routing by using BGP (Border Gateway Protocol) allowing us to reach a plethora of backbone providers. On top of that we use CICSO routers to ensure that the core routing is maintained.
Tape and network technology features are used through industry standard schedules to bring the protection of data to the next level. While Streamline data is backed up on-site through secure storage, services are also provided by the company, Iron Mountain, which provides state of the art secure data storage to most of the Fortune 500.
All of these reliable controls are protected by a technical infrastructure, which was designed to maintain services in the event of extreme weather or catastrophe.
Because security and reliability is absolutely imperative when it comes to your business, more details regarding the peace of mind we provide will be happily outlined for you at your request.