Our security, Your serenity
We know that data security is crucial to you – that’s why we devote significant resources to provide a secure environment 24x7. Our solutions provide state-of-the-art security to guard against service interruptions, protect the integrity of your data, and shield it from external attack.
Security Overview
A key benefit of our myCM private cloud platform is that we can provide you a turn-key SaaS system that is secure, reliable, rapidly deployed, and maintained across all your global locations.
Through our alliance with DataBank, a leader in enterprise hosting and managed IT services, your myCM system is fully hosted at a Tier 1 Data Center with world-class infrastructure, security, and managed services, including redundant power and environmental systems.
The myCM environment is protected by a multi-layered and defense-in-depth approach backed by professionals who are ready to respond at a moment’s notice, keeping your data safe and secure. Our data center’s five-layer defense approach provides comprehensive protection and includes a dedicated staff of security engineers and a seasoned CISO.
Compliance Overview
Our data center is annually re-certified for major compliance frameworks including FedRAMP, FISMA, SSAE18 (SOC & Cloud Security Alliance), HIPAA, PCI-DSS and Data Privacy Framework – GDPR.
If you have any questions or would like more information regarding our information security program, please contact your myCM representative or e-mail to: info@myCM.com.
Security-at-a-Glance
Our information security program includes a fully integrated portfolio of devices and services that cover all critical security areas.
Physical Security
- Site is gated and manned 24x7x365 with Data Center Operations personnel 
- Security badges / card readers and biometric access authentication required at each data center door; Doors are locked, alarmed and door access attempts are logged 
- Security cameras and proximity readers track all movement between areas 
- myCM server equipment is housed in a locked, segregated environment within the data center; physical access is logged and limited to pre-screened, authorized technicians 
- Multiple Tier-1 Service Providers and Redundant LAN Architecture 
- Alarm System; Redundant power and HVAC, fire suppression and photoelectric detection 
System Security
- Centralized network security and operations center manned 24x7x365 
- Data Center adheres to a broad range of information and security certifications including: FedRAMP, SSAE18 (SOC2 Trust Services Criteria & Cloud Security Alliance’s Cloud Control Matrix Criteria), PCI-DSS and Data Privacy Framework – GDPR 
- Logical access privileges are limited, controlled and reviewed 
- Dedicated firewalls and VPN services to help block unauthorized system access 
- Threat management, intrusion prevention systems (IPS), and intrusion detection systems (IDS), prevent unauthorized traffic 
- Systems are hardened, patched, monitored with centralized logging platform 
- Data protection with managed and encrypted backup solutions 
- Distributed Denial of Service (DDoS) mitigation services 
- Annual risk assessments and periodic vulnerability & penetration tests performed 
Operational Security
- Policies and procedures are based upon globally accepted security standards 
- Business continuity and daily data-backup programs with formal monitoring/testing to prevent and mitigate disruptions 
- Background checks and drug-screening of all personnel 
- Employees trained on documented information security and privacy procedures 
- Access to confidential and privacy information restricted to authorized personnel 
- Authenticated system access is required, limited, logged, and tracked 
- Information security and incident response procedures are trained and tested 
- Secure data-destruction policies for all sensitive information 
- Support ticket history logged, reviewed and approved via the data center portal 
Application Security
- User access security is multi-tiered, including user authentication, role-based security, task-based security and client-defined permission-based security 
- Optional SAML single-sign-on security service is available 
- Passwords are randomly generated and hashed with client-defined settings for password length, log attempts, password reset and session length 
- User access is logged and subject to denial of service controls 
- All data is encrypted during transmission and at rest 
- Secure media handling and destruction procedures for all client data 
- Support-ticket history logged, reviewed and approved via the myCM Portal 
- Documented SDLC and change-management procedures, with separate development, test and production environments 
Your data is safe with us.
Contact us to learn more about our secure solutions.
Page Credits - Photos: Unsplash and rawpixel.com.

 
                     
                 
                 
                 
                 
                 
                 
             
             
             
             
                 
                 
                 
                