CSC's holistic defense-in-depth security framework provides the physical, logical, access control and data integrity needed to support mission critical applications.
Access Control
- Gateway protected access
- Two factor authentication
- Key shields encryption
- Control, tracking, reporting of
access and access attempts
- Anti-spoofing
- CSC Audit Log Management for compliance with PCIDSS, SOZ,
HIPAA, GLB and other regulations
|
Physical Security
- Access-controlled Tier II or III data centers
- Servers in secure suites or cages
- Video surveillance monitored 24x7
- Personal background checks
- Multi-factor authentication
- Separation of staff duties
|
Logical Security
- Virtual and network perimeter firewalls
- Client data isolated
- Client separation via firewalls
- Hypervisor isolation for network adapters
- Optional dedicated network infrastructure
- ITIL standards
- Network intrusion detection
- 24 x 7 monitoring for malicious/unauthorized activities
|
Data Integrity
- Scheduled and ad hoc security scanning
- Security incident response 24x7 by CISSP professionals
- Annual SAS 70 (SSAE 16) Type II review
- Anti-virus services
- Network-based or host-based Intrusion prevention services
- Audit log capture, correlation, and reporting (ALA) for platform logs & security events
- PCI compliance scanning
|
Information Security is our business; it is engrained in our processes, our tools, our solutions and our culture– to us security is more than just a service.
Our information risk management professionals carrying CISSP, GCIH and Checkpoint certifications and are well versed in risk management practices refined through our 50 years of experience.
Contact Us to Learn More and Schedule a Briefing
Learn More About Our Managed Hosting Services
Compute | Identity | Database | Network | Storage & Backup
Application/Portal & Web Servers