Your data security, reliability, scalability and performance are critical.
Meeting high standards of security and flexibility. Interfacing’s cloud solution offers you a robust technology while remaining relatively low on costs and resources. Secure data centers are located globally to ensure your location benefits from regulatory and compliance factors over and above security and performance. Keeping your data local means your services benefit from agility, reliability and support services to meet ever changing digital transformation requirements.
With the highest service standards, and the lowest network latency, efficient and rapid secure access to your data, without service interruption is our commitment to your organization. Your data is maintained on well encrypted servers and only in the location of your choice. We will never store data other than in the country of your choosing. Your browsers offer encryption when data is transferred from the servers, thereby making the connection ultimately a secure one from end-to-end.
Cloud & Data Security
Data Seclusion / Data Encryption
- Data backups for all customers are encrypted
- Private secure servers per customer. No customers share any server or drives
- At rest data will always remain encrypted
- End-user connections take advantage of TLS (Transport Layer Security)
- Only secure channels used for all customer data sources
- Anytime regulatory and compliance auditing
- Advanced threats to immediate alerts & notifications
- Server / data health
- Server performance
- Server Uptime
- Security alerts, prompts and notifications
- All employees are subject to background checks as part of our vetting and screening process
- Extensive and continuous cloud security training
- Continuous training related to cloud operations practices.
- Employees DO NOT have direct access to client data
Security Framework Alignments
- Business Continuity Planning
- Contingency planning
- Data, & physical security compliance
- Risk assessment compliance
- System integrity & communications protection
- Security access controls and authentication compliance
- Segmentation in both data and application
- Data is only replicated within the same region; in different availability zones physically separated by a meaningful geographical distance.
- Meeting all regulatory compliance.
- Hosting only in the customer location specified
- Affected customers notified immediately on discovery.
- All reported incident are investigated by our SRT (Security Response Team)
- Remediation include publishing information to mitigate a reoccurrence, updates/upgrades and immediate hotfixes
- Scanning for vulnerabilities
- External and internal testing completed by a reputable security firm.
- Confirmation of zero exploitation of isolation architecture.
- Secure virtual private cloud network
- Platform security that is role based with administrative delegation
- SAML, LDAP, Active directory supported
Defense Security Protection
- Multiple Layer Network and Host Intrusion Detection Systems (IDS)
- Access controls between infrastructure tiers both monitored and restricted
- Firewalls – Network and Application layers
- 24×7 monitoring of all file integrity
Contact Interfacing to learn more about our Cloud Data Security Architecture.
A key differentiator of Interfacing to other digital and business transformation consulting firms is that Interfacing offers its own innovative technology solution in support of transformation programs. Interfacing’s software solutions deliver the transparency required to reduce complexity, improve execution and facilitates agility and change.
Interfacing’s integrated management system is a one-stop-shop for managing transformation programs. We know it’s a very competitive environment out there. It is for that reason our strength is in our commitment to maintain flexibility throughout the project lifecycle whether it is in our innovative products or in our team of experts.