Recovery Point has implemented The Federal Information Security Management Act (FISMA) to provide customers with a secure, predictable and trustworthy environment in which  to support their mission-critical environments. In accordance with FISMA requirements, we continuously monitor and audit an extensive set of security configurations and controls to protect critical infrastructure components. Boundary protection controls include FISMA-compliant policies and procedures, intrusion detection, penetration testing, multi-factor authentication, and on-going vulnerability scans of the hundreds of FISMA controls in place. The FISMA boundary also helps to detect and prevent malicious intrusions, reducing the threat of a client-impacting event from cyber-attacks.