security

best data recovery

State-of-the-Art Data Security

We use the most advanced data security and disaster recovery technologies in the world which encompass the following:

  • All client data is stored on secure servers within a closed secure network. VPN terminal keys update in 30 minute intervals around the clock to maintain impenetrable access. 

 

  • Multi-zone segmented networks onsite ensure the containment of critical data, sensitive information and secure systems throughout the facility. All internet access is secured over an end-to-end firewall VPN (Virtual Private Network) that instantly terminates any session of unauthorized use.

  • All systems and networks have role based access controls to ensure privacy, confidentiality and security.  Employee access is regularly reviewed and assessed for each employee to ensure the criteria for internal security clearance levels are maintained.

  • Backups are performed every hourly across the facility.  Redundancy is built in across all critical systems to keep all security measures online.

  • Regularly scheduled penetration tests and vulnerability scans are performed internally and via third party.

AdobeStock_119317881-1024x768.jpg
secure data recovery

SECURITY STANDARDS

We take security extremely seriously and you can rest assured we are in compliance and meet the guidelines of virtually every security and privacy standard.  

  • PCI Compliant - The Payment Card Industry Data Security Standard (PCI-DSS)

  • Our lab meets SOC II Type 2 standards for secure data recovery facilities.

  • HIPAA Compliant for all medical service providers and insurance providers nationwide.

  • Accreditation under the EU-US and Swiss-US Privacy Shield Frameworks.

Your Data.  Your Choice.

confidential data recovery
  • Security is an integral part of choosing a Data Recovery Service Provider and we understand that this is your data and your business.  We are here to help and we do not want to make anything more difficult than it already is during this situation. 

  • We offer End-to-End-Encryption for any FTP uploads to get your data to you faster and we can encrypt the drive your data is sent back on at your request. 

  • Should you require a 'Business Associate Agreement' or a 'Confidential Disclosure Agreement', we can handle that and any other confidentiality request within reason. 

  • We keep a constant log and chain of custody report for your data and device every moment it is in our possession.    We treat every job as if it were our own.  Every client's hardware and data is handled with extreme care throughout the process, start to finish.

  • If you are a government contractor and require security clearance for anyone in contact with the data and your device that all individuals are US Citizens, we have you covered. 

  • Whatever the need or requirements you might have, it is likely we have done it before and are flexible to your needs.  This is your data and we understand strict internal protocols and procedures can dictate the recovery process for some clients.   Call us today to speak with one our Data Recovery Specialists if you have questions, concerns or requests in reference to security. 

UNDER LOCK & KEY

  • Lab premises are under surveillance 24 hours a day, 7 days a week.  There are no blind-spots throughout the entire facility.

 

  • No one can enter or traverse the facility without key-card access unless they are a designated logistics provided who has been buzzed in by staff.

  • All employee movement is logged into our security suite software that has hardware mounted next to every door on premises.  Employees are only given access to their delegated work and common areas.

  • Staff members are thoroughly vetted and must adhere to stringent security policies and protocols in line with all the major audits and certifications such as ISO 9001/27001, SSAE 18 and SOC II.

data recovery compliance

#1

TOP CHOICE

For IT Departments and System Administrators

Silicon Valley to Wall-Street and everything in-between.

compliant data recovery
 
..... ..... .....
..... ..... .....
...... ......