How is your data secured in our Cloud
Security Details
Cloudsis ISO/IEC 27001 certificate overseen by ISO accreditation provider.
This certificate guanrantees:
1. High-level cyber security
Periodical examination
Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities, and impacts.
Security Controls
Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable.
Overarching management
Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis.
2. Physical hardware security
Data centres are UK based, primary data centre in Croydon, secondary data centre in Maidenhead.
Data Centre Multi-level Security
Controls to prevent unauthorised access to the site, buildings and data halls as well as to the rack housings themselves. Systems in place to identify and react to threats, so the infrastructure is protected from theft, damage or interference.
-
Tier 3 standard
-
24/7 Security
-
ISO 27001
Power & Generators
To eliminate risk caused by outage or power failure, the site uses diverse supplier feeds from multiple grid points ensuring there is no single point of failure. The site provides N+1 redundant power systems and power feeds up to 30Kw 3 phase per rack to ensure continuous power.
-
10Kw rack power
-
ABC UPS string N+1 resilience
-
12Mw total power
Connectivity
The site houses diverse network connectivity via Dark Fibre to multiple London points of presence with 2ms of network latency, to ensure ultra-fast connectivity with low latency to London locations.
-
2ms of network latency
-
Dark Fibre networks
-
Carrier neutral
Cooling & Performance
We reduce energy consumption and costs by using ultra-efficient systems and advanced cold aisle and pod technology. We use N+2 efficient blended cooling to optimise the data centre environment to a designed PUE of 1.3.
PUE of 1.3
Cold aisle containment
Ultra-efficient
Fire Detection & Suppression
Ensuring our infrastructure and customer equipment operate safely is one of our greatest concerns. The facility is equipped with VESDA fire detection which continuously samples the air for smoke particles. In the event of an alert we have installed a FM200 suppression system.
VESDA fire detection
FM200 suppression system
3. Strict Backup regimes
Cloudsis solutions use a full daily back-up on a rotating 30-day cycle.
Business Continuity
Cloudsis solutions use a full daily back-up on a rotating 30-day cycle. Cloudsis utilises IBM Storage Area Network (SAN) systems. This means that if one physical machine fails then the second system kicks in with minimal interruption to the services.
A traditional back-up is also taken and the secondary SAN unit stores these daily back-ups using an enterprise back-up solution. These back-ups run over our link between our Data Centres so that customer data is backed up to an offsite location.
Total control of your own Data
Clients want the surety that they always have access and control of their own data. As such Cloudsis, in addition to its own procedures, supply an optional Recovery OneDrive service, which can be used independently by you to backup selective data automatically. Our technology will ensure that the selected folders are automatically transferred from your Cloud Server to your OneDrive account every day. Then just login to OneDrive anytime and see your data.
Even in the worst disaster scenario, you can have immediate access to your most important data. To maintain reliability and high availability, this data is replicated by Microsoft in at least two geographically distributed data centre locations in your Geo. Office 365 uses service-side technologies that encrypt customer data at rest and in transit. For customer data at rest, Microsoft uses volume-level and file-level encryption.
4. Firewalls and Auditing
Cloud solutions brought to your by Cloudsis are provided in line with the ISO 27001 Security Standard.
Advanced Security
Systems are protected by Netscaler Hardend Devices and Untangle firewalls,. Penetration tests are run on a monthly basis. Antivirus and Antispam are provided on all systems.
Cloudsis are also in the process to be Cyber Essentials accredited.
Virus Blocker
Virus Blocker leverages signatures from Bitdefender, the leader in speed and efficacy, whose threat lab experts work 24-hours a day, 365-days a year to identify emerging threats. Heuristic models provide an additional layer of protection against zero-day threats, and real-time updates with no system downtime ensure that your network is always protected. Identifies and blocks zero-day threats, viruses, worms, Trojan horses, botnets, unknown malware, and new infections.
Spam Blocker
The firewall sits between the Internet and your server, filtering and quarantining fraudulent email—spam, phishing and email fraud—preventing it from reaching your users. Its smart analysis delivers a catch rate of 99.5% while minimizing false positives. Spammers constantly adjust their content and tactics to evade spam blockers. Spam Blocker is updated in real-time to keep you one step ahead of spammers. If you use one of our 365 Email accounts your email is directly protected by Microsoft. You can see further details here.
Phish Blocker
Identity thieves are becoming increasingly sophisticated with email and website spoofs that are nearly impossible to discern from the real thing. Phish Blocker protects users from email phishing attacks and fraudulent pharming websites. Protection for SMTP protocols ensures that signatures are always current with automatic updates.
We also prvide Security Training Sessions to ensure that our cloud users are able to identify potential threads and contribute to keep the system safe. Prevention is always better than cure!
Intrusion Protection
Intrusion Prevention blocks hacking attempts before they reach internal servers. Our pre-configured system signature-based IPS makes it easier to provide 24/7 network protection from hackers.
It minimizes false positives and ensures that signatures are always current with automatic updates. Over 34,000 signature detections, including heuristic signatures for port scans, enable us to effectively monitor and block most suspicious requests.
5. Malware protection
Solving the most important cybersecurity challenges facing your business with innovative technology.
Ransomware Protection
Ransomware poses a real risk to organizations like yours. One successful attack can halt your business operations and negatively impact your brand and customers. Our Malware Protection and Response proactively fights ransomware at every stage of the attack chain with a blend of signature and signature-less technologies. Proactively detects and blocks attempts to compromise application vulnerabilities and remotely execute code on the endpoint. Includes Leverage Malware Machine Learning which has been deployed with a new aggressive anomaly detection model to proactively identify suspicious executables.
Antivirus augmentation
Our Malware Techbology fortifies the antivirus, taking security to the next level. Cybercriminals leverage multiple attack vectors to successfully bypass the signature-based detection technology used by traditional antivirus. That's why nearly 44% of organizations are looking to augment their existing antivirus solution with advanced endpoint protection that includes both static and dynamic detection techniques. Our Malware technology complements the antivirus and ensures your endpoint, users, and data have the protection you need.