One of the foremost concerns on the mind of users is that OCLM Scheduling Software is not only effective but also secure. To keep pace in the ever-changing computer security landscape, we use a global leader in the cloud data center marketplace. We operate out of one of their secure datacenters located in the United States of America.
Data Center Details:
Many of the world’s leading enterprises use the same cloud provider that supports over one billion customers. Also, ninety percent of fortune five hundred companies trust their business to be on the same cloud provider. They have implemented enhanced security, operational management and threat mitigation practices, helping them to deliver services that achieve higher levels of security, privacy, and compliance. They invest over a billion dollars every year into security.
As many as 3,500 dedicated cybersecurity professionals are working together to help protect, detect and respond to threats in real time. The physical datacenter has extensive multi-layered protections to ensure unauthorized users cannot gain physical access to the data.
The cloud datacenter is designed to run 24x7x365 and employs various measures to help protect operations from power failure, physical intrusion, and network outages. These datacenters comply with industry standards, such as ISO 27001 for physical security and availability. They are managed, monitored, and administered by operations personnel. They have around the clock security staff, physical barriers, fencing, alarms, security operations center, seismic bracing, security cameras and two-factor access control with biometric and card readers, cameras and days of backup power.
Data at Rest: Fortified by Transparent Data Encryption (TDE)
The Database employs Transparent Data Encryption (TDE) to safeguard customer data at rest. TDE encrypts the entire database, including backups, ensuring that even if unauthorized access to the storage media occurs, the data remains secure and unintelligible without the appropriate encryption key. This robust encryption mechanism provides an additional layer of defense, bolstering the security posture of your stored information.
Data in Transit: Secured with SSL/TLS Protocols
Ensuring the secure transmission of sensitive data is paramount, and the Database achieves this through the implementation of industry-standard SSL/TLS protocols. These protocols encrypt the communication channels between your applications and the database, protecting the data as it travels over networks. By enforcing encrypted connections the SQL Database mitigates the risk of eavesdropping and interception, providing a secure conduit for data in transit.
Compliance with Industry Standards: Meeting Regulatory Requirements
The Database is designed with a commitment to meeting industry-specific compliance standards. This includes regulations like GDPR, HIPAA, and ISO 27001, among others. By aligning with these standards, the Database provides customers with the assurance that their data storage and transmission practices meet or exceed the security requirements set forth by various regulatory bodies.
Our cloud provider adheres to rigorous guidelines to maintain compliance and receive certifications such as ISO (International Organization for Standardization) 27001. This standard contains hundreds of specifications for how an organization should manage its information infrastructure to keep it secure. At least once per year, the ISO hires a third party to audit the cloud provider to ensure that it’s compliant with the specifications and that the specs are working efficiently for them. Adherence to this standard has granted them tremendous acceptance in the global marketplace. They were the first cloud provider to adhere to ISO 27018 which protects PII (Personally Identifiable Information). They also meet a broad set of international as well as regional and industry-specific compliance standards, such as ISO 27001, FedRAMP, SOC 1 and SOC 2. Their adherence to the strict security controls contained in these standards is verified by rigorous third-party audits that demonstrate their services work with and meet world-class industry standards, certifications, attestations, and authorizations. They have more certifications than any other cloud provider.
Regular Software Audits and Updates
We vigorously check our web software to make sure it implements the latest security best practices and we use a global leader in the data center marketplace. It’s our foremost goal to keep your data secure!
Data Security Measures
Security FAQ