Security

Security

Encryption

All data stored in Engram Vault is encrypted at rest and in transit. This means that your data is protected even if someone gains unauthorized access to your account or our servers.

Security and Compliance is so important to us, we made an entire page dedicated to it.

We use industry-standard encryption algorithms, such as AES-256, to protect your data. These algorithms are considered to be unbreakable, so you can be confident that your data is safe.

Physical Security

Our data centers are located in the United States and are world-class facilities with a variety of physical security features to protect your data.

  • Raised floors: Raised floors allow for easy access to the data center infrastructure, and they also provide space for cooling and ventilation systems.

  • HVAC temperature control systems with separate cooling zones: These systems ensure that the data center is kept at a constant temperature and humidity level, which is essential for protecting the equipment.

  • Seismically braced racks: These racks help to protect the equipment from earthquakes and other natural disasters.

  • State-of-the-art smoke detection and fire suppression systems: These systems help to detect and suppress fires quickly, which can help to prevent data loss.

  • Motion sensors: These sensors help to detect unauthorized access to the data center.

  • 24/7 secured access: The data center is secured 24/7 by a team of security professionals.

  • Video camera surveillance: The data center is monitored by video cameras 24/7.

  • Security breach alarms: The data center is equipped with security breach alarms that will notify the security team of any unauthorized access.

We are committed to protecting your data. That’s why we have implemented a comprehensive set of physical security measures to protect your data from unauthorized access, theft, and damage.

Network Security

Our network security is a top priority. We constantly check for known application and service vulnerabilities with periodic third party reviews of our network infrastructure. We also use a variety of security measures to protect our network, including firewalls, intrusion detection systems, and data encryption.

We believe that network security is essential for any business that handles sensitive data. That’s why we are constantly working to improve our security measures. We also regularly review our security policies and procedures to ensure that they are up-to-date and meet the latest security standards.

Here are some additional details about our network security measures:

  • Firewalls: We use firewalls to block unauthorized access to our network. Firewalls are a type of security system that monitors and controls incoming and outgoing network traffic. They can be used to block specific types of traffic, such as traffic from known malicious IP addresses.

  • Intrusion detection systems: We use intrusion detection systems to monitor our network for suspicious activity. Intrusion detection systems are a type of security system that monitors network traffic for signs of intrusion. They can be used to detect unauthorized access, denial-of-service attacks, and other malicious activity.

  • Data encryption: We use data encryption to protect our data from unauthorized access. Data encryption is a process of converting data into a form that cannot be read without a key. This makes it difficult for unauthorized users to access our data, even if they are able to gain access to our network.

We are committed to protecting your data. That’s why we have implemented a comprehensive set of network security measures to protect your data from unauthorized access, theft, and damage.

Auditing

Engram Vault logs all user activity. This means that you can track who has accessed your data and when. This information can be helpful if you need to investigate a security incident.

We also offer a variety of reports that you can use to track your data usage. These reports can help you to identify trends and potential problems.

Compliance

Engram Vault is a cloud-based backup solution that helps businesses comply with a variety of regulatory requirements. Our data centers are SSAE-16 certified, which means that they meet the highest standards for security and compliance.

We offer a variety of features that can help businesses comply with the following regulations:

  • HIPAA: The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that protects the privacy of patient health information. Engram Vault can help businesses comply with HIPAA by encrypting all data at rest and in transit, and by providing robust access controls.

  • Sarbanes-Oxley: The Sarbanes-Oxley Act (SOX) is a federal law that requires public companies to maintain accurate financial records. Engram Vault can help businesses comply with SOX by providing detailed audit logs and by allowing businesses to track user activity.

  • Gramm-Leach-Bliley: The Gramm-Leach-Bliley Act (GLBA) is a federal law that protects the privacy of financial information. Engram Vault can help businesses comply with GLBA by encrypting all financial data and by providing robust access controls.

  • SEC/FINRA: The Securities and Exchange Commission (SEC) and the Financial Industry Regulatory Authority (FINRA) are two federal agencies that regulate the financial industry. Engram Vault can help businesses comply with SEC and FINRA regulations by providing detailed audit logs and by allowing businesses to track user activity.

If you require any specific compliance, please make sure to let us know so we can place your storage pools accordingly. We are committed to helping our customers comply with all applicable regulations.