As your Cloud Solutions provider there is no greater priority for us than the safety and security of your data.
How is your data secured in our Cloud
High lever Cyber Security
Cloudsis ISO/IEC 27001 certification accreditation which includes a coherent and comprehensive suite of information security controls and/or other forms of risk treatment.
Strict backup regimes
Cloudsis uses a full daily back-up on a rotating 30-day cycle.
Cloudsis utilises IBM Storage Area Network (SAN) systems. We also offer you total control of your data with external OneDrive backups.
Firewalls blockers and antimalware
All services provided by Cloudsis are provided in line with the ISO 27001 Security Standard. Systems are protected by Netscaler Hardend Devices and Untangle firewalls.
Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities, and impacts.
Cloudsis ISO/IEC 27001 certificate overseen by ISO accreditation provider.
This certificate guanrantees:
1. High-level cyber security
Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable.
Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis.
2. Physical hardware security
Data centres are UK based, primary data centre in Croydon, secondary data centre in Maidenhead.
Data Centre Multi-level Security
Controls to prevent unauthorised access to the site, buildings and data halls as well as to the rack housings themselves. Systems in place to identify and react to threats, so the infrastructure is protected from theft, damage or interference.
Tier 3 standard
Power & Generators
To eliminate risk caused by outage or power failure, the site uses diverse supplier feeds from multiple grid points ensuring there is no single point of failure. The site provides N+1 redundant power systems and power feeds up to 30Kw 3 phase per rack to ensure continuous power.
10Kw rack power
ABC UPS string N+1 resilience
12Mw total power
The site houses diverse network connectivity via Dark Fibre to multiple London points of presence with 2ms of network latency, to ensure ultra-fast connectivity with low latency to London locations.
2ms of network latency
Dark Fibre networks
Cooling & Performance
We reduce energy consumption and costs by using ultra-efficient systems and advanced cold aisle and pod technology. We use N+2 efficient blended cooling to optimise the data centre environment to a designed PUE of 1.3.
PUE of 1.3
Cold aisle containment
Fire Detection & Suppression
Ensuring our infrastructure and customer equipment operate safely is one of our greatest concerns. The facility is equipped with VESDA fire detection which continuously samples the air for smoke particles. In the event of an alert we have installed a FM200 suppression system.
VESDA fire detection
FM200 suppression system
3. Strict Backup regimes
Cloudsis solutions use a full daily back-up on a rotating 30-day cycle.
Cloudsis solutions use a full daily back-up on a rotating 30-day cycle. Cloudsis utilises IBM Storage Area Network (SAN) systems. This means that if one physical machine fails then the second system kicks in with minimal interruption to the services.
A traditional back-up is also taken and the secondary SAN unit stores these daily back-ups using an enterprise back-up solution. These back-ups run over our link between our Data Centres so that customer data is backed up to an offsite location.
Total control of your own Data
Clients want the surety that they always have access and control of their own data. As such Cloudsis, in addition to its own procedures, supply an optional Recovery OneDrive service, which can be used independently by you to backup selective data automatically. Our technology will ensure that the selected folders are automatically transferred from your Cloud Server to your OneDrive account every day. Then just login to OneDrive anytime and see your data.
Even in the worst disaster scenario, you can have immediate access to your most important data. To maintain reliability and high availability, this data is replicated by Microsoft in at least two geographically distributed data centre locations in your Geo. Office 365 uses service-side technologies that encrypt customer data at rest and in transit. For customer data at rest, Microsoft uses volume-level and file-level encryption.
4. Firewalls and Auditing
Cloud solutions brought to your by Cloudsis are provided in line with the ISO 27001 Security Standard.
Systems are protected by Netscaler Hardend Devices and Untangle firewalls,. Penetration tests are run on a monthly basis. Antivirus and Antispam are provided on all systems.
Cloudsis are also in the process to be Cyber Essentials accredited.
Virus Blocker leverages signatures from Bitdefender, the leader in speed and efficacy, whose threat lab experts work 24-hours a day, 365-days a year to identify emerging threats. Heuristic models provide an additional layer of protection against zero-day threats, and real-time updates with no system downtime ensure that your network is always protected. Identifies and blocks zero-day threats, viruses, worms, Trojan horses, botnets, unknown malware, and new infections.
The firewall sits between the Internet and your server, filtering and quarantining fraudulent email—spam, phishing and email fraud—preventing it from reaching your users. Its smart analysis delivers a catch rate of 99.5% while minimizing false positives. Spammers constantly adjust their content and tactics to evade spam blockers. Spam Blocker is updated in real-time to keep you one step ahead of spammers. If you use one of our 365 Email accounts your email is directly protected by Microsoft. You can see further details here.
Identity thieves are becoming increasingly sophisticated with email and website spoofs that are nearly impossible to discern from the real thing. Phish Blocker protects users from email phishing attacks and fraudulent pharming websites. Protection for SMTP protocols ensures that signatures are always current with automatic updates.
We also prvide Security Training Sessions to ensure that our cloud users are able to identify potential threads and contribute to keep the system safe. Prevention is always better than cure!
Intrusion Prevention blocks hacking attempts before they reach internal servers. Our pre-configured system signature-based IPS makes it easier to provide 24/7 network protection from hackers.
It minimizes false positives and ensures that signatures are always current with automatic updates. Over 34,000 signature detections, including heuristic signatures for port scans, enable us to effectively monitor and block most suspicious requests.
5. Malware protection
Solving the most important cybersecurity challenges facing your business with innovative technology.
Ransomware poses a real risk to organizations like yours. One successful attack can halt your business operations and negatively impact your brand and customers. Our Malware Protection and Response proactively fights ransomware at every stage of the attack chain with a blend of signature and signature-less technologies. Proactively detects and blocks attempts to compromise application vulnerabilities and remotely execute code on the endpoint. Includes Leverage Malware Machine Learning which has been deployed with a new aggressive anomaly detection model to proactively identify suspicious executables.
Our Malware Techbology fortifies the antivirus, taking security to the next level. Cybercriminals leverage multiple attack vectors to successfully bypass the signature-based detection technology used by traditional antivirus. That's why nearly 44% of organizations are looking to augment their existing antivirus solution with advanced endpoint protection that includes both static and dynamic detection techniques. Our Malware technology complements the antivirus and ensures your endpoint, users, and data have the protection you need.
We can also help you to protect your local infrastructure
IoT, Internt of things
With the proliferation of IoT, internet of things devices, the attack surface for hackers has increased massively. Traditional antivirus software was designed on the assumption that there were just a few operating systems. Now, because of IoT, there are thousands. Network security tools are becoming increasingly necessary in a world where everything - from lamp-posts to lawn sensors - is becoming Internet-enabled.
How many unsecured devices are connected to your network?
These include security cameras, elevators and seemingly innocuous gadgets such as tills, printers or power supplies amongst others. Businesses typically underestimate by 30% to 40% how many devices are linked to their network. These unidentified devices could definitely have been access points for hackers who could have then found how to control critical assets on your network. Once they have acces hackers could steal sensitive data, encrypt it, then demand a ransom for its safe return.
Even if you work in the coud your local network may be at risk.
Cloud providers have normally thousands of security controls governing its services that are periodically updated to tackle new threats. Data is also protected through encryption and sharding.
Does this mean that your company is safe? The answer is no. Your local network is still at risk, and it is vital to protect it and analyse the behaviour of all the connected devices to detect possible anomalies.
According to the new General Data Protection Regulation, as a Data Processor, you will have to safeguard data and ensure data resilience to a high standard. You must have a cyber resilience strategy in place to reduce the risk of data breaches. It should include enterprise-grade tools as robust firewalls, anti-malware/virus tools and monitoring against hacking and staff visiting suspicious phishing websites. If you fail to comply with the Regulation you could find yourself being fined up to €20 million or 4% of your company’s global annual turnover, whichever figure is larger, and your reputation could be seriously damaged.
Delivery of your new Cloudsis Solution in less than 5 days
One of our core principals was to bring simplicity to the ordering and implementation of the Cloudsis solution. Our system is ready for you to join the thousands of customers already enjoying the freedom of Cloud computing.