SysCloud ensures that your data is secure, available, and accessible at all times. We have different layers of security measures to make sure that your data is private and safe.
SysCloud is a SSAE18/SOC2 certified organization. We have stringent reporting requirements on how we manage security, availability, data processing integrity, data confidentiality, and privacy.
All of our cloud resources are logically isolated using VPCs.
We use the 256-bit AES encryption for protecting data when it is at rest and TLS/SSL security for data in motion.
We are compliant with major regulations like FERPA, HIPAA, and PCI. These regulations ensure that your data is always protected and safe.
We use TLS (Transport Layer Security) protocol to assure privacy and data integrity whenever you access data from our backup to view or restore them.
We perform network penetration testing to find and eliminate security vulnerabilities using Owasp-ZAP and Burp Suite. Dangerous exposures and security flaws are detected using.
Production server access is granted only to a few SysCloud employees with specific operational requirements. All changes made to the production server are constantly tracked and recorded.
SysCloud is an ‘Advanced Technology Partner‘ within the AWS partner’s ecosystem. The SysCloud – AWS partnership allows us to host our applications and data within the ultra-secure cloud infrastructure provided by AWS.
We have configured the Web Application Firewall to proactively guard against threats and incursions associated with cloud applications.
AWS customers are automatically protected from most-common, frequently-occurring network, and transport layer DDoS attacks.
We collect and analyze AWS activity logs to identify anomalies and exceptions associated with security breaches.
We monitor threats and vulnerabilities on the computing resources used for backingup customer data and to continuously improve our security posture. In AWS, we use both Amazon Inspector and Amazon CloudWatch to assess our application vulnerabilities or deviations from security best practices and to keep track of alert notifications triggered by specific events.