Secure the Boundary, Secure the Content
It’s critical to have confidence in the integrity of your business resilience program. Leveraging FISMA principals and controls, Recovery Point uses best-in-class defense in depth measures to secure boundary infrastructure and help you safeguard your content. These controls are built into Recovery Point’s cloud and disaster recovery services from the ground up and into every phase of our service delivery architecture. Each deployment is designed to provide the security assurance you need to protect your critical resilience infrastructure and data.
Using layered, defense in depth measures, Recovery Point provides holistic protection against attacks that can lay siege to and disrupt your critical data and resilience infrastructure. Concentric, layered defenses are designed to deter against the most sophisticated attacks and provide rapid detection and containment. With integrated layers working together, our security architecture offers a cohesive view across all attack vectors. Resilience infrastructure is only as reliable as the underlying processes and procedures used to administer and protect it.
Recovery Point colocation facilities are home to a broad spectrum of public and private sector clients and are all audited against key national standards for site, network and data security, including both SOC2 and PCI-DSS and others.
We qualify our facilities and services against the most rigorous Federal and industry benchmarks so our clients and their auditors and risk managers can be confident that the services we provide will enhance the security of their critical IT assets.