zsah Cloud Offering Security FAQ In partnership with Clearswift

Similar documents
Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Hosted Desktop Features & Benefits. Technology House, 59 Washway Road, Sale, Manchester, M33 7AB Support

What can the OnBase Cloud do for you? lbmctech.com

TB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored

Security Principles for Stratos. Part no. 667/UE/31701/004

Online Services Security v2.1

Hosting your success. Best in class cloud services, to keep your business ahead

Access UK Ltd. Data centre Security. Data Centre Summary v.2.0 _ December Date: 12 th January Version: 1.1. Parkinson / Daniel Gould

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

Canada Life Cyber Security Statement 2018

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication

Data Sheet The PCI DSS

EU General Data Protection Regulation (GDPR) Achieving compliance

Your Trusted Partner in Europe European Business Reliance Centre

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

QuickBooks Online Security White Paper July 2017

Croner Hosting Services

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

Twilio cloud communications SECURITY

AWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.

Custom cloud hosting for your Sitecore Experience Platform.

Tieto Compliance Cloud For a more secure IT environment

HCL GRC IT AUDIT & ASSURANCE SERVICES

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

WORKSHARE SECURITY OVERVIEW

SoftLayer Security and Compliance:

April Appendix 3. IA System Security. Sida 1 (8)

Xerox Audio Documents App

DATA CENTRE & COLOCATION

Data Protection and GDPR

Layer Security White Paper

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Security Awareness Training Courses

Google Cloud & the General Data Protection Regulation (GDPR)

Security

Fully managed Cloud-based business software solution

Watson Developer Cloud Security Overview

CONTINUOUS COMPLIANCE. Your next cloud compliance audit could be your last. With LayerV s Continuous Compliance Service you re covered

Data Security at Smart Assessor

Altius IT Policy Collection

Protecting your data. EY s approach to data privacy and information security

Compliance and Security in a Cloud-First Era

Clearswift Hosting Options

BHConsulting. Your trusted cybersecurity partner

KantanMT.com. Security & Infra-Structure Overview

FIS Global Partners with Asigra To Provide Financial Services Clients with Enhanced Secure Data Protection that Meets Compliance Mandates

Electrical Solutions in action

CyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET

COLOCATION A BEST PRACTICE GUIDE TO IT

Datacentres & Colocation

Broward County RFP TEC P1

RAPID7 INFORMATION SECURITY. An Overview of Rapid7 s Internal Security Practices and Procedures

INFORMATION ASSET MANAGEMENT POLICY

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

IaaS Buyer s Checklist.

Altius IT Policy Collection Compliance and Standards Matrix

Verasys Enterprise Security and IT Guide

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

Awareness Technologies Systems Security. PHONE: (888)

CTS performs nightly backups of the Church360 production databases and retains these backups for one month.

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Service Description Safecom Customer Connection Version 3.5

ANSWERS TO FREQUENTLY ASKED QUESTIONS

What is BS 7799? BS 7799 is the most influential, globally recognised standard for information security management.

Data Centre & Colocation in Birmingham. Flexible. Secure. Accredited.

Managed Services Rely on us to manage your business services

Security and Compliance at Mavenlink

Microsoft Azure Security, Privacy, & Compliance

Security Note. BlackBerry Corporate Infrastructure

Infrastructure Security Overview

Paperspace. Security Primer & Architecture Overview. Business Whitepaper. 20 Jay St. Suite 312 Brooklyn, NY 11201

IT your way - Hybrid IT FAQs

UKAS accredited Certification Bodies

This paper introduces the security policies, practices, and procedures of Lucidchart.

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

WEEE disposal and the creation of social value. Jon Selby Tier 1 Asset Management Ltd

2. The Information we collect and how we use it: Individuals and Organisations: We collect and process personal data from individuals and organisation

Therefore TM Online. White Paper: Information in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

The simplified guide to. HIPAA compliance

ISO Professional Services Guide to Implementation and Certification AND

Cyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group

We Make IT Simple. IT Support and Security Specialists.

SECURITY PRACTICES OVERVIEW

Cloud-Based Data Security

6 Tips to Find the Right Colocation Center for You

Providing premium colocation and networking solutions to end user clients

Information Security at Veritext Protecting Your Data

SECURITY & PRIVACY DOCUMENTATION

Manchester Metropolitan University Information Security Strategy

Altius IT Policy Collection Compliance and Standards Matrix

Dimension Data IaaS Services. Gary Ramsay

UKAS Guidance for Bodies Offering Certification of Anti-Bribery Management Systems

Curatrix. How can Curatrix Communications help your business? Communications. Connecting your Business

Cloud FastPath: Highly Secure Data Transfer

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Transcription:

zsah Cloud Offering Security FAQ In partnership with Clearswift

zsah s Cloud Offering Overview zsah Main office and Data Centres Our main office is located in central London with support staff available 24x7, 365 days a year We use world-class UK Data Centres located in London and Manchester Data Handling All client data is hosted in our UK data centres No customer data is sent outside the UK (assisting with GDPR compliance) Only the client has access to their own data (not zsah staff) Each client is assigned its own VLAN and can only access their data using a secure SSL VPN All access is encrypted to Secure SSL over VPN standard Data is encrypted using AES-256 encryption zsah Certifications and Compliance We have the following certifications: ISO 27001:2013 (UKAS accredited), ISO 9001:2015 (UKAS accredited), Cyber Essentials We are ISO audited annually by an external organization (details can be provided upon request) Our contracts comply fully with the Data Protection Act (2018), GDPR and Data Security Standards All of our operations are risk managed and reviewed on a regular basis Regular PEN testing is undertaken by an external security company zsah have a Change Management process and Business Continuity/Disaster Recovery Plan 2 Cloud Offering Security FAQ

Security Management Tools zsah takes security management very seriously and employs a number of tools to safeguard our client s data and to monitor access including: Encryption SSL VPN s Firewalls Intrusion Detection Systems Access controls Authentication DDoS protection Infrastructure management tools zsah ltd 3

Data Centre Overview zsah uses only the very best UK data centres managed by Telehouse with a strong pedigree and track record in resilience and security located in London and Manchester. These Data centres are Tier 3/4 and are used by a wide range of leading global companies and organisations across all sectors including finance and government. zsah s strategy is to only use market leading facilities where the highest levels of security, resilience and capabilities can be provided. We have our own secure locked racks/cabinets and equipment in the datacentres and only authorised zsah engineers have access to this. Security is multi-layered to safeguard the datacentre 24 hours a day, 7 days a week, 365 days a year. Data centre physical site security includes the following measures: A single point of entry into the data centre for employees and clients Coded key cards for entry into the data centre Biometric scanners Surveillance cameras located throughout the data centre Database of individuals authorised to access the date centre Manned security staff Strict visitor controls Data centre physical site security includes the following measures: ISO 9001:2008 Quality Management Standard ISO 14001:2004 Environmental Management System Standard ISO/IEC 27001:2005 Information Security Management PCI DSS (Payment Card Industry Data Security Standard) Attestation BS 25999-2:2007 Business Continuity Management The Carbon Trust Standard 4 Cloud Offering Security FAQ

About zsah zsah, established in 2002, offer a complete managed IT solution to our customers. From managing your cloud infrastructure, to supporting your companies day to day IT and DBAaaS. Our service offerings add value to your existing functions or complement your IT operations, where and when you want. Based in London, our teams consist of smart, driven, responsive and security-minded people who deliver a personal, dedicated service. Together with our robust, reliable infrastructure, our people can support, develop and manage your technology needs so you can do what you do best. With the kind of partners, experience and ethics that characterise zsah, we enjoy exceptionally high loyalty, satisfaction and retention rates from our customers. For further information or to talk to a cloud or security expert in confidence, please call 020 7060 6032 or email info@zsah.net zsah ltd 5

zsah Ltd. Suite 7-8, 3-9 Imperial Rd, Fulham, London, UK, SW6 2AG www.zsah.net info@zsah.net +44 (0) 20 7060 6032 ISO ISO 9001 27001 INFORMATION QUALITY SECURITY ASSURANCE MANAGEMENT