The Difference: Serious Security

SharePoint » Team » The Difference: Serious Security

This continuing blog series addresses the difference – what sets us apart as a premier, white-glove SharePoint Hosting service. The series is intended for SharePoint consultants, project managers, C-level executives, IT directors (or anyone else faced with choosing a business IT strategy that can help their company do more with less). Our goal is to highlight’s strengths and help you make an informed decision for your hosting needs. If you’re just joining our series, please take a look back at Part One:’s Customer Care.’s Security

Admit it, security is always a concern with hosting. Arguably it’s the concern with hosting. Data must be secure. We get it. And you’re absolutely right.

When something is hosted in the Cloud, there’s a degree of trust required along with it. You’re handing over data (which a lot of the time is super sensitive) and you’re expecting the provider to keep it safe. To protect it with everything they’ve got and keep it readily accessible for you but no one else. It’s how this game works.

And because we understand the importance and critical necessity of our role in this arrangement, we go big with security.

Basically, the only thing you have to worry about is if George Clooney puts together a gaggle of 11 mischievous, well-dressed schemers to develop an over-the-top caper that accesses your data. Because apparently nothing can keep them out. Other than that, you’re in safe hands.

First, let’s address:

The Misconception of On-Premise Security

Just because you can see it, doesn’t mean it’s more secure. Actually, it’s the opposite. Having your data center in-house makes it more susceptible to physical security breaches as well as wear and tear. If you can get into the server room . . . who else has access?

So you’re not as secure as you think or you’re paying through the roof for the security your data demands. Good security is crazy expensive and it needs to be updated and upgraded all the time. This keeps it up to date with the latest security threats, and unfortunately most of the time for on-premise security measures, they’re implemented after a breach or some other disaster. More cost. More headache.

And it’s typically not your company’s core competency. Without a dedicated team regularly updating, upgrading, patching, purchasing, and troubleshooting for each company location, your infrastructure will suffer.

According to Internet security company Webroot’s research, “Organizations spend an average of 127 hours per month managing on-site security solutions and related problems.” They added that “organizations with more remote or mobile employees face more problems when using on-premise security.” Making them 43% more likely to experience a cyber attack. The eye-opening study concludes that “those using cloud security are 30% less likely to experience phishing attacks than those using on-premise security solutions, 25% less likely to experience viruses or worms, and 20% less likely to experience spyware.” has all the enterprise security that companies dream of, and it’s all done on a fixed budget. No worries, no headache, no capital expenses. Everything taken care of for you. We keep the data safe through a variety of state-of-the-art measures that have a happy home with:

Our Ironclad Data Centers

Pull back the curtain from the Cloud and you won’t find a fluffy, marshmallow-like cumulonimbus form in the stratosphere – you’ll find a building. More specifically, you’ll find a state-of-the-art facility that makes it its business to protect data. And business is good.

We handle security on both ends with our Data Center facilities. Cyber and Physical. Either way, no one’s getting in. Rather than go into detail about all of our features, I’ll list them and if you have further questions about any one, leave a comment and I’ll elaborate.

Data Center Cyber Security

  • Secure VPN, SSL Encrypted Tunnels
  • Redundant ISP4 Backbone (Sprint, Level(3), Cogent)
  • Redundant DC Power Rectifiers
  • Biometric and Card Access Entry System
  • Redundant CRAC Units
  • VESDA Early Warning Fire Detection
  • Redundant Firewalls & IDP
  • Uninterruptable Power Supply (UPS) backups

Data Center Physical Security

  • Early warning intrusion detection system
  • 24/7 On-Site Armed Security
  • Closed Circuit Digital Camera System
  • Security System Monitoring (On and Off Site)
  • Multiple Checkpoints to controlled areas
  • All equipment housed in locking cabinets, cages or suites
  • Building is restricted access beyond lobby

I’ll close with some icing on our Security cake before this post gets too long. The question must be, how can I know that the security is really this serious?

We’re SSAE 16 SOC I Type II Certified.

SSAE shield graphicWhich may sound like a droid from Star Wars but is actually the internationally recognized auditing standard that was developed by the American Institute of Certified Public Accountants (AICPA). Basically, it means that we have been thoroughly tested through a series of audits performed on our control activities for all IT and related processes. And that means that if it doesn’t have that kind of stamp on it, you shouldn’t trust it!

Today’s enterprise IT departments need to comply with all sorts of regulations and our SSAE 16 SOC I Type II certification makes sure they’re met. Whether it’s HIPAA, PCI, Sarbanes-Oxley, etc, customers need that compliance guarantee of security and reliability. We’ve got it.

Our Secure Network Protection

Our servers are fully redundant and backed up by five diesel generators. Disaster recovery is available with everything we host, and item-level or daily backups are available for a reasonable monthly-fee. We extend our network protection with a financially-backed 100% uptime SLA guarantee so you’re protected from unscheduled outages and guaranteed maximum uptime with free rapid hardware replacement.

And that’s the difference. Serious security carefully packed into every SharePoint Hosting solution.

Thanks for reading. For further information about our security measures, please read about’s Disaster Recovery options. works with individual clients to identify the perfect Business Continuity Plan to fit their company, securing their critical information from ever being lost. Companies can’t run without the IT department, so careful planning makes sure this is never the case. Our custom Disaster Recovery is just another branch off the Difference tree – designed and customized specifically for our valued customers.

2012-08-14T03:23:07+00:00 August 14th, 2012|

Leave A Comment