Confidentiality, Data Integrity, and Security
|We look below the surface issues to deal
with redundancy, fail over technology, multi-general back-ups, power
generation and physical security.
Most people think about hackers or viruses when they talk about security.
This is only the start for a professional hosting company. We look below
the surface issues to deal with redundancy, fail over technology, multi-general
back-ups, power generation and physical security. The single biggest security
hole in most companies is the lack of secure remote access to your information.
The alternative is your employees copying customer lists and critical
information and taking it home with them. This is good from a productivity
standpoint, but not from a security viewpoint. Centralized, secure data
with limited download capabilities are your best safeguards. Companies
keep their cash in a professionally managed organization called a bank,
why would they not do the same with the asset that produces that cash;
Confidentiality, Security and Data Integrity Features Include:
© 2005 JupiterImages Corporation
We recognize your company’s need for confidentiality and is committed
to safeguarding your data from access by other organizations or individuals.
We work with you and your staff to establish a secure policy and then
we enforce it.
- Only You Can See Your Data
- Limited Managed Desktop Access
- Individual User Restrictions
- Managed Desktop Shares Nothing
We recognize that your data is one of the most important assets of your
company. We employ a multilevel approach to insuring your data is intact
and available. Your data and processing are maintained over multiple servers
and storage devices, and replicated across independent data centers. Backups
are managed daily and tape media is stored off-site. Our redundancies
minimize any single point failure and are a critical component in guaranteeing
your data is available and intact when you need it.
- Multiple data centers
- Redundant Systems
- Centralized Tape Management
- Off–site tape storage
|Cracking the AES key has been calculated
to take 149 trillion years, using the most sophisticated technology
We take security very seriously. Beyond redundancy and confidentiality,
we are very conscious of the technical world in which we live. Network
Security, firewalls, encryption standards are all words and phrases that
have become part of everyday speech. We proactively manage these issues
and takes an aggressive approach to both current and pending security
issues. We look for what is on the horizon and ways to combat those who
would disrupt the free flow of information. What follows is an overview.
Details have been specifically and intentionally left out, for obvious
We are very proud of the technical staff of The Managed Desktop solution.
They maintain certifications from Microsoft, Symantec, Citrix, Cisco,
and other industry leading companies. All of the Managed Desktop's staff
are encouraged to look for any opportunity to improve our security in
any way possible.
- Windows 2000/2003
The developer of Managed Desktop uses Microsoft's Windows 2000 and 2003
Server, Advanced Server, and/or Data Center Server software as a platform
for hosting clients. These operating systems have proven to be extremely
stable, reliable and scalable.
A variety of both hardware and software tools are used to protect our
systems from hackers, Internet worms, viruses and other individuals
attempting to disrupt or gain access to the systems.
- Physical Security
Managed Desktop servers are located in secure, geo-environmental stable
Usernames and passwords are required to access the Managed Desktop systems.
Regular changes to passwords are required and multiple invalid login
attempts will disable a user's account.
- Virus Protection
All Managed Desktop servers are protected by multiple layers of Anti-Virus
systems. Automated procedures ensure that the latest anti-virus updates
are loaded to these systems on a daily basis.
- Server Based Computing
Your data does not move across the Internet, only your fully encrypted
keystrokes and screen images are transmitted during normal application
- Log Files
All system log files are monitored daily for attempted security breaches
and system failures.
- 128 bit Encryption
All communication between the Managed Desktop servers and our client
workstations is scrambled and cannot be read by someone as it travels
- AES Encryption
This is the encryption standard used by both the U.S. Government and
Managed Desktop. AES technology is deployed for all Managed Desktop
VPN connections. Cracking the AES key has been calculated to take 149
trillion years, using the most sophisticated technology currently available.
- Monitoring Software
Special software to alert technicians of actual or potential problems
is deployed in the data centers.
- Updates and Upgrades
System security updates and patches are applied on an on-going basis
to ensure the most stable and secure environment possible for our Clients.
|Contact a specialist at PIC with your questions or specifics
by calling (203) 912-2200 or by filling out our Inquiry