Secure The Boundary
Defense in depth for your data begins at the boundary of your cloud provider’s infrastructure. Defense in depth, a strategy that originated in the military, will help you stay ahead of the latest security threats and meet the most stringent regulatory and compliance requirements. Leveraging FISMA principals and controls, Recovery Point’s boundary security incorporates a comprehensive security framework based on defense in depth strategies that utilize next generation processes and technologies.
Dedicated Security Operations Center (SOC) analysts, led by CISSP credentialed ISSO management, use threat intelligence and advanced analytics 24x7x365 to detect and remediate threats at the perimeter on your behalf. Built-in security includes the latest in:
- Network Intrusion Detection
- Log Correlation and Analysis
- Security Incident and Event Management (SIEM)
- Continuous Monitoring for Suspicious Behavior, Changes to Key Attributes, Registry Keys and Access Control Lists
- Integrated and Centrally Administered Role Based Access Control
- In-Flight and At-Rest Data Encryption
- Endpoint Protection, Detection and Response
- Periodic Penetration Testing
- Vulnerability Remediation and Lifecycle Management
- Comprehensive Patch Management
- Threat Intelligence
- SSL-VPN
- Multi-Factor Authentication
All of our single-purpose sites feature robust physical security, including badge/photo ID access, biometric screening, escort-only datacenter entry protocols, video surveillance and 24x7x365 on-site staffing.
Our security processes and controls have undergone rigorous third-party security controls assessments (SCA) to verify compliance with the NIST 800-53 FISMA Moderate Guide for Security Controls for Information Systems.
Secure The Content
Information Security Assurance in the digital age is a shared responsibility. Within the security compliance framework, we provide you with the tools and services necessary to operate secure, reliable and cost-effective systems in the cloud. Our extensive Cloud Service Catalog provides the tools for you to implement architectural best practices and apply security at all layers to safeguard the security of your data. Tools include:
- Vulnerability Scanning
- Multi-Factor Authentication
- Encryption
- Role-Based Access Control
- Malware and Anti-Virus Scanning
- Intrusion Detection
- Threat Intelligence
- Performance Monitoring
- Configuration Hardening (CIS Benchmarks)
- Deep Packet Inspection
- Endpoint protection
- Cisco ASAv Firewalls
- Cisco NGFW with IDS
- F5 LTM Load Balancing with DDOS
- Alert Logic Cloud Defender Suite
Security is built into Recovery Point’s cloud services from the ground up and into every phase of our services delivery architecture. Leverage our resources to meet your requirements for privacy, compliance and risk management with best practices tools and processes designed to defend against bad actors on the internet.
With Recovery Point’s services, you can easily deploy best practices tools to secure your operating systems, networks, platforms and data. Get the security you need, when you need it, without the need to incur costly capital outlays.