One of the foremost concerns on the mind of users is that the OCLM L&M Meeting Scheduler Software is not only effective but also secure. To keep pace in the ever-changing computer security landscape, we use a global leader in the cloud data center marketplace. We operate out of one of their secure datacenters located in the United States of America.

Many of the world’s leading enterprises use the same cloud provider that supports over one billion customers. Also ninety percent of fortune five hundred companies trust their business to be on the same cloud provider. They have implemented enhanced security, operational management and threat mitigation practices, helping it to deliver services that achieve higher levels of security, privacy, and compliance than we could achieve on their own. They invest over a billion dollars every year into security.

As many as 3,500 dedicated cybersecurity professionals are working together to help protect, detect and respond to threats in real time. The physical datacenter has extensive multi-layered protections to ensure unauthorized users cannot gain physical access to the data. All the data transit through the cloud’s network infrastructure is automatically encrypted to ensure the confidentiality and integrity of data to prevent unauthorized users from gaining access. Then 265 bit SSL keeps your data encrypted all the way to your computer’s internet browser.

Our cloud provider adheres to rigorous guidelines to maintain compliance and receive certifications such as ISO (International Organization for Standardization) 27001. This standard contains hundreds of specifications for how an organization should manage its information infrastructure to keep it secure. At least once per year, the ISO hires a third party to audit the cloud provider to ensure that it’s compliant with the specifications and that the specs are working efficiently for them. Adherence to this standard has granted them tremendous acceptance in the global marketplace. They were the first cloud provider to adhere to ISO 27018 which protects PII (Personally Identifiable Information). They also meets a broad set of international as well as regional and industry-specific compliance standards, such as ISO 27001, FedRAMP, SOC 1 and SOC 2. Their adherence to the strict security controls contained in these standards is verified by rigorous third-party audits that demonstrate their services work with and meet world-class industry standards, certifications, attestations, and authorizations. They have more certifications than any other cloud provider.

They deploy combinations of preventive, defensive and reactive controls including the following mechanisms to help protect against unauthorized activity. They also use a combination of scanning tools to run OS, web application and database scans of the cloud environment including conducting regular penetration testing to improve security controls and processes.

The cloud datacenter is designed to run 24x7x365 and employs various measures to help protect operations from power failure, physical intrusion, and network outages. These datacenters comply with industry standards, such as ISO 27001 for physical security and availability. They are managed, monitored, and administered by operations personnel. They have around the clock security staff, physical barriers, fencing, alarms, security operations center, seismic bracing, security cameras and two-factor access control with biometric and card readers, cameras and days of backup power.

We vigorously check our OCLM web software to make sure it implements the latest security best practices and we use a global leader in the cloud data center marketplace. It’s our foremost goal to keep your data secure!

Home Terms Privacy Contact ©2022