DATA CENTER AND DISASTER RECOVERY

YOU CAN TRUST THE CLOUD

On premise:

• One location
• Manual backups
• Frequent interruptions

Cloud:

• Redundant locations
• Hot backups
• Rare interruptions

WE ARE STRATEGICALLY PARTNERED WITH

THE WORLD’S LARGEST CLOUD ERP VENDOR

SUPPORTING:

buildings-icon

20,000+

ORGANIZATIONS

money-icon

8 Million

INVESTED IN R&D PER YEAR

logins-2

4 Million

UNIQUE LOGINS PER QUARTER

requests

70 Billion

REQUESTS PER YEAR

ENTERPRISE-CLASS DATA MANAGEMENT, SECURITY, PERFORMANCE AND AVAILABILITY

Scalability

  • Architecture currently supports over 20,000 organizations with billions of user requests per month.
  • Data centers are designed to accommodate surges and spikes in usage, and to scale to address increased volume and transactions.

Complete Separation of Duties

  • Job responsibilities are separated, and mandatory employee background checks are employed at all levels of operations
  • The principle of least authority (POLA) is followed and employees are given only those privileges necessary to do their duties.

Redundancy

  • Our underlying infrastructure incorporates multiple levels of redundancy to guard against failure.
  • Redundant systems automatically assume processing without any interruption should any element fail.

Hot Backups

  • All production data is stored immediately to redundant locations.
  • Hot backups give the ability to restore your data rapidly and reliably.

Disaster Recovery

  • Data in the primary data center is replicated and synchronized across data centers.
  • All operations fail over to the secondary data center automatically if required.

Offsite Backups

  • All data is automatically backed up and stored offsite.
  • Backups are stored offsite in a secure location and safeguarded against almost any environmental conditions.
  • ODBC connector can be implemented as well to pull data to a local SQL Database

Fully Guarded Premises

  • On-premise security guards monitor all alarms, personnel activities, access points, shipping and receiving, and ensure that entry and exit procedures are correctly followed on a 24/7 basis.
  • CCTV video surveillance cameras with pan-tilt-zoom capabilities are located at points of entry to the collocation and other secured areas
    within the perimeter.

Continuous Security Monitoring

  • Numerous intrusion detection systems (IDS) to identify malicious traffic attempting to access its networks.
  • Any unauthorized attempts to access the data center are blocked, and unauthorized connection attempts are logged and investigated.
  • Enterprise-grade anti-virus software guards against trojans, worms, viruses and other malware from affecting the software and applications.

Managed Physical Access

  • Stringent physical security policies and controls to allow unescorted access to pre-authorized Operations personnel.
  • Photo ID proximity access cards and a biometric identification system provide assurance against lost badge risks or other attempts at impersonation. Proximity card reader devices are located at major points of entry and critical areas within the data centers
  • Single-person portals and T-DAR man traps guarantee that only one person is authenticated at one time to prevent tailgating.
  • All perimeter doors are alarmed and monitored and all exterior perimeter walls, doors, windows and the main interior entry are constructed of materials that afford Underwriters Laboratory- (UL) rated ballistic protection.

Data Compliancy
ISAE 3402
SSAE 16
US:EU Safe Harbor
ISO 27001
SAS70 Type II
PCI-DSS<

Logos

GovSense is the secure cloud vendor you can trust.

Want to learn more?

See what GovSense can do for your jurisdiction. Contact us today to schedule a demo.

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text.

Start typing and press Enter to search