Cloud Security

As your Cloud Solutions provider there is no greater priority for us than the safety and security of your data.

 

How is your data secured in our Cloud

01

High lever Cyber Security

Cloudsis ISO/IEC 27001 certification accreditation which includes a coherent and comprehensive suite of information security controls and/or other forms of risk treatment.  

Physical hardware security

02
Data centres are UK based, primary data centre in Croydon, secondary data centre in Maidenhead.
They comply with the strictest standards. 

Strict backup regimes

03
Cloudsis uses a full daily back-up on a rotating 30-day cycle.
Cloudsis utilises IBM Storage Area Network (SAN) systems. We also offer you total control of your data with external OneDrive backups.

Firewalls blockers and antimalware

04
All services provided by Cloudsis are provided in line with the ISO 27001 Security Standard. Systems are protected by Netscaler Hardend Devices and Untangle firewalls. 

Security Details

Cloudsis ISO/IEC 27001 certificate overseen by ISO accreditation provider.

This certificate guanrantees:

 

1. High-level cyber security

Periodical examination

Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities, and impacts. 

Security Controls

Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable.

Overarching management

Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis.

 

2. Physical hardware security​

Data centres are UK based, primary data centre in Croydon, secondary data centre in Maidenhead.

 

Data Centre Multi-level Security

Controls to prevent unauthorised access to the site, buildings and data halls as well as to the rack housings themselves. Systems in place to identify and react to threats, so the infrastructure is protected from theft, damage or interference.

  •  Tier 3 standard

  •  24/7 Security

  •  ISO 27001

Power & Generators

To eliminate risk caused by outage or power failure, the site uses diverse supplier feeds from multiple grid points ensuring there is no single point of failure. The site provides N+1 redundant power systems and power feeds up to 30Kw 3 phase per rack to ensure continuous power.

  • 10Kw rack power 

  • ABC UPS string N+1 resilience

  • 12Mw total power

Connectivity

The site houses diverse network connectivity via Dark Fibre to multiple London points of presence with 2ms of network latency, to ensure ultra-fast connectivity with low latency to London locations.

  • 2ms of network latency

  • Dark Fibre networks

  • Carrier neutral

Cooling & Performance

We reduce energy consumption and costs by using ultra-efficient systems and advanced cold aisle and pod technology. We use N+2 efficient blended cooling to optimise the data centre environment to a designed PUE of 1.3.
    PUE of 1.3
    Cold aisle containment
    Ultra-efficient
 

Fire Detection & Suppression

Ensuring our infrastructure and customer equipment operate safely is one of our greatest concerns. The facility is equipped with VESDA fire detection which continuously samples the air for smoke particles. In the event of an alert we have installed a FM200 suppression system.
    VESDA fire detection
    FM200 suppression system

 

3. Strict Backup regimes

Cloudsis solutions use a full daily back-up on a rotating 30-day cycle.

 

Business Continuity

Cloudsis solutions use a full daily back-up on a rotating 30-day cycle. Cloudsis utilises IBM Storage Area Network (SAN) systems. This means that if one physical machine fails then the second system kicks in with minimal interruption to the services. 

A traditional back-up is also taken and the secondary SAN unit stores these daily back-ups using an enterprise back-up solution. These back-ups run over our link between our Data Centres so that customer data is backed up to an offsite location.
 

Total control of your own Data

Clients want the surety that they always have access and control of their own data. As such Cloudsis, in addition to its own procedures, supply an optional Recovery OneDrive service,  which can be used independently by you to backup selective data automatically. Our technology will ensure that the selected folders are automatically transferred from your Cloud Server to your OneDrive account every day. Then just login to OneDrive anytime and see your data.


Even in the worst disaster scenario, you can have immediate access to your most important data. To maintain reliability and high availability, this data is replicated by Microsoft in at least two geographically distributed data centre locations in your Geo. Office 365 uses service-side technologies that encrypt customer data at rest and in transit. For customer data at rest, Microsoft uses volume-level and file-level encryption. 

 

4. Firewalls and Auditing

Cloud solutions brought to your by Cloudsis are provided in line with the ISO 27001 Security Standard.

 

Advanced Security

Systems are protected by Netscaler Hardend Devices and Untangle firewalls,. Penetration tests are run on a monthly basis. Antivirus and Antispam are provided on all systems.

Cloudsis are also in the process to be Cyber Essentials accredited.

Virus Blocker

Virus Blocker leverages signatures from Bitdefender, the leader in speed and efficacy, whose threat lab experts work 24-hours a day, 365-days a year to identify emerging threats. Heuristic models provide an additional layer of protection against zero-day threats, and real-time updates with no system downtime ensure that your network is always protected. Identifies and blocks zero-day threats, viruses, worms, Trojan horses, botnets, unknown malware, and new infections.

Spam Blocker

The firewall sits between the Internet and your server, filtering and quarantining fraudulent email—spam, phishing and email fraud—preventing it from reaching your users. Its smart analysis delivers a catch rate of 99.5% while minimizing false positives. Spammers constantly adjust their content and tactics to evade spam blockers. Spam Blocker is updated in real-time to keep you one step ahead of spammers. If you use one of our 365 Email accounts your email is directly protected by Microsoft. You can see further details here.

Phish Blocker

Identity thieves are becoming increasingly sophisticated with email and website spoofs that are nearly impossible to discern from the real thing. Phish Blocker protects users from email phishing attacks and fraudulent pharming websites. Protection for SMTP protocols ensures that signatures are always current with automatic updates.

We also prvide Security Training Sessions to ensure that our cloud users are able to identify potential threads and contribute to keep the system safe. Prevention is always better than cure!

Intrusion Protection

Intrusion Prevention blocks hacking attempts before they reach internal servers. Our pre-configured system signature-based IPS makes it easier to provide 24/7 network protection from hackers.

 

It minimizes false positives and ensures that signatures are always current with automatic updates. Over 34,000 signature detections, including heuristic signatures for port scans, enable us to effectively monitor and block most suspicious requests.

 

5. Malware protection

Solving the most important cybersecurity challenges facing your business with innovative technology.

 

Ransomware Protection

Ransomware poses a real risk to organizations like yours. One successful attack can halt your business operations and negatively impact your brand and customers. Our Malware Protection and Response proactively fights ransomware at every stage of the attack chain with a blend of signature and signature-less technologies. Proactively detects and blocks attempts to compromise application vulnerabilities and remotely execute code on the endpoint. Includes Leverage Malware Machine Learning which has been deployed with a new aggressive anomaly detection model to proactively identify suspicious executables.

Antivirus augmentation

Our Malware Techbology fortifies the antivirus, taking security to the next level. Cybercriminals leverage multiple attack vectors to successfully bypass the signature-based detection technology used by traditional antivirus. That's why nearly 44% of organizations are looking to augment their existing antivirus solution with advanced endpoint protection that includes both static and dynamic detection techniques. Our Malware technology complements the antivirus and ensures your endpoint, users, and data have the protection you need.

 
 

Delivery of your new Cloudsis Solution in less than 5 days

One of our core principals was to bring simplicity to the ordering and implementation of the Cloudsis solution. Our system is ready for you to join the thousands of customers already enjoying the freedom of Cloud computing.

Would you like to see our Cloud solution?

Book a demo

with one of our consultants

 

Have a question about Cloudsis?

Call 020 3740 3444 , Mon-Fri 9am-5:30pm

 

Zahara Procurement Software

Zahara Purchase Orders

Zahara Invoice Automation

Zahara Invoice Express

Zahara Opera 3 Integration

Zahara Videos

About us

Contact us

Blog

Free Trial request

Free Consultancy Call