Return to Home   Contact Us   Site Map      
Return to Home

Confidentiality, Data Integrity, and Security
We look below the surface issues to deal with redundancy, fail over technology, multi-general back-ups, power generation and physical security.

Most people think about hackers or viruses when they talk about security. This is only the start for a professional hosting company. We look below the surface issues to deal with redundancy, fail over technology, multi-general back-ups, power generation and physical security. The single biggest security hole in most companies is the lack of secure remote access to your information. The alternative is your employees copying customer lists and critical information and taking it home with them. This is good from a productivity standpoint, but not from a security viewpoint. Centralized, secure data with limited download capabilities are your best safeguards. Companies keep their cash in a professionally managed organization called a bank, why would they not do the same with the asset that produces that cash; information.

Confidentiality, Security and Data Integrity Features Include:

Business Intelligence (MAS 90® and MAS® 200 Software) - formerly "Accounting Software"
© 2005 JupiterImages Corporation    

Confidentiality
We recognize your company’s need for confidentiality and is committed to safeguarding your data from access by other organizations or individuals. We work with you and your staff to establish a secure policy and then we enforce it.

  • Only You Can See Your Data
     
  • Limited Managed Desktop Access
     
  • Individual User Restrictions
     
  • Managed Desktop Shares Nothing

Data Integrity
We recognize that your data is one of the most important assets of your company. We employ a multilevel approach to insuring your data is intact and available. Your data and processing are maintained over multiple servers and storage devices, and replicated across independent data centers. Backups are managed daily and tape media is stored off-site. Our redundancies minimize any single point failure and are a critical component in guaranteeing your data is available and intact when you need it.

  • Multiple data centers
     
  • Redundant Systems
     
  • Centralized Tape Management
     
  • Off–site tape storage
Cracking the AES key has been calculated to take 149 trillion years, using the most sophisticated technology currently available.

Security
We take security very seriously. Beyond redundancy and confidentiality, we are very conscious of the technical world in which we live. Network Security, firewalls, encryption standards are all words and phrases that have become part of everyday speech. We proactively manage these issues and takes an aggressive approach to both current and pending security issues. We look for what is on the horizon and ways to combat those who would disrupt the free flow of information. What follows is an overview. Details have been specifically and intentionally left out, for obvious reasons.

  • Personnel
    We are very proud of the technical staff of The Managed Desktop solution. They maintain certifications from Microsoft, Symantec, Citrix, Cisco, and other industry leading companies. All of the Managed Desktop's staff are encouraged to look for any opportunity to improve our security in any way possible.
     
  • Windows 2000/2003
    The developer of Managed Desktop uses Microsoft's Windows 2000 and 2003 Server, Advanced Server, and/or Data Center Server software as a platform for hosting clients. These operating systems have proven to be extremely stable, reliable and scalable.
     
  • Firewalls
    A variety of both hardware and software tools are used to protect our systems from hackers, Internet worms, viruses and other individuals attempting to disrupt or gain access to the systems.
     
  • Physical Security
    Managed Desktop servers are located in secure, geo-environmental stable sites.
     
  • Passwords
    Usernames and passwords are required to access the Managed Desktop systems. Regular changes to passwords are required and multiple invalid login attempts will disable a user's account.
     
  • Virus Protection
    All Managed Desktop servers are protected by multiple layers of Anti-Virus systems. Automated procedures ensure that the latest anti-virus updates are loaded to these systems on a daily basis.
     
  • Server Based Computing
    Your data does not move across the Internet, only your fully encrypted keystrokes and screen images are transmitted during normal application usage.
     
  • Log Files
    All system log files are monitored daily for attempted security breaches and system failures.
     
  • 128 bit Encryption
    All communication between the Managed Desktop servers and our client workstations is scrambled and cannot be read by someone as it travels the Internet.
     
  • AES Encryption
    This is the encryption standard used by both the U.S. Government and Managed Desktop. AES technology is deployed for all Managed Desktop VPN connections. Cracking the AES key has been calculated to take 149 trillion years, using the most sophisticated technology currently available.
     
  • Monitoring Software
    Special software to alert technicians of actual or potential problems is deployed in the data centers.
     
  • Updates and Upgrades
    System security updates and patches are applied on an on-going basis to ensure the most stable and secure environment possible for our Clients.

    Contact a specialist at PIC with your questions or specifics by calling (203) 912-2200 or by filling out our Inquiry Form.

 
Home | Positive Impact Corporation | Resources | Contact Us
Positive Impact Corporation
 Copyright 1989 - 2010   Positive Impact Corporation. All rights reserved.