SECURITY IS OUR #1 PRIORITY
SysCloud ensures that your data is secure, available, and accessible at all times. We have different layers of security measures to make sure that your data is private and safe.
Security & data privacy practices at SysCloud
SysCloud is a SSAE18/SOC2 certified organization. We have stringent reporting requirements on how we manage security, availability, data processing integrity, data confidentiality, and privacy.
Virtual Private Cloud
All of our cloud resources are logically isolated using VPCs.
We use the 256-bit AES encryption for protecting data when it is at rest and TLS/SSL security for data in motion.
We are compliant with major regulations like FERPA, HIPAA, and PCI. These regulations ensure that your data is always protected and safe.
TLS Secure Encryption
We use TLS (Transport Layer Security) protocol to assure privacy and data integrity whenever you access data from our backup to view or restore them.
We perform network penetration testing to find and eliminate security vulnerabilities using Owasp-ZAP and Burp Suite. Dangerous exposures and security flaws are detected using Nmap and Nessus.
Production server access is granted only to a few SysCloud employees with specific operational requirements. All changes made to the production server are constantly tracked and recorded.
SysCloud is an 'Advanced Technology Partner' within the AWS partner's ecosystem. The SysCloud - AWS partnership allows us to host our application's and data within the ultra secure cloud infrastructure provided by AWS.
Your data is well protected using Azure's extensive set of security controls and capabilities. We leverage Azure availability zone to guarantee a 99.99% uptime.
SysCloud leverages AWS & AZURE security features for data protection
Web Application Firewall
We have configured the Web Application Firewall to proactively guard against threats and incursions associated with cloud applications.
Both Azure and AWS customers are automatically protected from most-common, frequently-occurring network, and transport layer DDoS attacks.
Reports and Logs
We collect and analyze Azure and AWS activity logs to identify anomalies and exceptions associated with security breaches.
Security Center / Inspector / CloudWatch
We monitor threats and vulnerabilities on the computing resources used for backing up customer data and to continuously improve our security posture. In AWS, we use both Amazon Inspector and Amazon CloudWatch to assess our application vulnerabilities or deviations from security best practices and to keep track of alert notifications triggered by specific events. In Azure, we rely on the security center to guard against remote desktop protocol (RDP) brute-force attacks, SQL injections, and other dangers.