Safeguarding Data, Layer By Layer
Overlapping Layers of Protection
AirDesk systems monitor many facets of infrastructure and operations
Wide Selection of Upgrade Options
Individual protection profiles can be tailored to meet unique needs through a variety of hardware and software security options.
Unique, Highly Secure Network Design
A Network-Within-a-Network topology provides out-of-band management for remote access with reduced exposure to external threats.
Exceptional Standard Security Offering
AirDesk services come standard with one of the industry’s most comprehensive sets of security features.
Latest Security Technologies
Data is protected by industry-leading systems offering comprehensive defenses.
If an infrastructure is not physically secure, neither is the enterprise. Physical and operational security is the foundation of the AirDesk infrastructure. No other measures matter without it. Every AirDesk data center is fully audited based on SSAE 16 reporting on controls to meet industry-recognized requirements for security—no exceptions.
Data Center and Server Room Measures
- Data centers have controlled access and 24-hour security
- No server room doors are public-facing
- Server rooms are staffed 24/7
- Un-marked entry and exit doors
- Digital security video surveillance
- Biometric security systems
- Server room access strictly limited to data center employees and escorted contractors or visitors
- Barcode-only identification on hardware; no customer markings of any type on the servers themselves
Operational Measures
- Engineers and technicians trained on internal industry standard policies and procedures
- Redundancy for all core systems for disaster recovery and business continuity
- 2-factor authentication for Customer Portal access adds greater server security
- All data removed from re-provisioned machines with drive wipe software approved by the Department of Defense
- Ongoing PCI DSS compliance
- Current SSAE 16 SOC reports
Even the tiniest flaw can compromise a company’s network – and all the people and data on it. AirDesk Data Centers use innovative network architecture and adhere to a commitment of using the most advanced hardware technologies. These efforts dramatically minimize data center and server exposure to outside threats. Systems are fully accessible to administrative personnel but off-limits to others.
The Network-Within-a-Network
- Public Network handles public traffic to hosted websites or online resources
- Private Network allows for out-of-band management through a distinct stand-alone third carrier over SSL, PPTP, or IPSEC VPN gateways
- Data Center to Data Center Network provides secure connectivity between servers housed in separate facilities
Beneath the layers of physical and network protection, individual computing systems, applications, and data are further safeguarded by several tiers of comprehensive, standard security features. A dynamic range of security options ensure an enterprise’s security profile.
Standard Services
Private Network Windows and Red Hat Update Servers
Servers within the Private Network receive the latest operating system security patches and upgrades, allowing initiation and installation of patches and updates on-demand.
Virus Scan and Host Intrusion Servers
These systems combine antivirus, anti-spyware, firewall, and intrusion prevention technologies to stop and remove malicious software from the infrastructure.
Network IDS/IPS Protection
Through partnerships with leading hardware and software vendors, a complete array of intrusion protection and assessment options are offered at both the network and host level.
Vulnerability Assessment and Reporting
Providing active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis of security posture.
Anti-Virus and VirusScan
Delivers always-on, real-time anti-virus protection of core Linux and Windows environments to monitor systems for potential attacks.
SSL Certificates
The SSL certificates are backed by respected providers. Every SSL Certificate is signed with a reliable and ubiquitous root so customers don’t have to worry.