Home Technology Security
Security

Our Business is Based on the Security of Yours

Literally. If our facilities and systems aren’t absolutely secure, we aren’t doing our job. We’re fanatics—to the point that our employees can’t enter any of our facilities without biometric fingerprint scanning. In addition to biometric and photo/key badge technology, InfoIMAGE's server room remains closed at all times, accessible only by authorized IT personnel through authorized electronic key badge entry. The server room is even isolated from the restricted access rooms used by other IS personnel for data processing, production and storage. Access to server rooms and data are strictly limited. Personnel who do not need access are denied access.

We protect clients with an unprecedented level of security and redundancy—from our network to production. Every facility is under constant surveillance by both cameras and our security team. Ultra-safe check rooms protect all physical documents, while co-location with 1,800-mile separated facilities ensures uninterrupted business productivity. We’re built to withstand hackers and disaster downtime and our redundant failover Internet security hardware and protocols allow you to determine what data resides on or leaves our company campuses and servers. By strict InfoIMAGE policy, no customer data is ever transported on laptops or portable storage media. Customer files are erased from servers and workstations immediately after production use. And each one of our employees undergoes an extensive background check before they ever join our team. Security is paramount in all of our internal training curriculums. It’s the common thread that runs through every aspect of our business. Just ask our employees—they know it as a key business objective.

 

SSAE 16 Certified

We protect our clients with unparalleled levels of security and redundancy. In addition to biometric, photo and key badge technology, our server room remains securely locked at all times, accessible only by authorized personnel through electronic entry. InfoIMAGE can assure its customers that its data center operations meet a certain level of quality. The SSAE 16 (Statement on Standards for Attestation Engagements No. 16) looks at InfoIMAGE’s processes, policies, procedures, and operational activities and validates everything is performing at optimal standards regarding security, availability and operating integrity. InfoIMAGE has successfully completed its SOC 1 and SOC 3 audits for its Menlo Park, CA and Coppell TX data centers. When you choose InfoIMAGE, choose with confidence, knowing we’ve put the necessary internal controls in place to keep your data safe.

 

Service Organization Controls (SOC) 1 Type II Reports help customers build trust and confidence in InfoIMAGE’s control procedures via stringent verification and validation of InfoIMAGE’ control activities and processes conducted by an independent Certified Public Accountant. The American Institute of Certified Public Accountants (“AICPA”) recently created the Service Organization Control Report framework, and replaced SAS 70 with SSAE 16.

An SOC 3 audit focuses on controls, called Trust Services Principles, related to security, availability, confidentiality, processing integrity and privacy—validating that the system is protected against unauthorized physical and logical access, for example.   The SOC 3 Report is available to customers and prospective customers by clicking the SOC3 icon below.


For InfoIMAGE, this standard of performance is one of the leading organizational credentials that can be attained. It reflects both the quality of our services and long-term commitment to our clients.