ILS' state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry (man-trap) containment, electronics, biometrics, key cards, and 24/7 video surveillance and full time Network Operations Center. Our multiple data centers provide second site backup and disaster recovery faculties, assuring against data loss.
As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. Multiple power grids, backup systems, and diesel-powered generators assure that your data will remain accessible even if local power fails. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures.
ILS secures its network with the following tools:
- Strict access controls via an active directory.
- 24/7/365 monitoring for possible vulnerabilities, malware sampling, malicious events, DDOS attacks, blacklisted websites, and front-end anti-virus protection
- Gateway Security Intrusion Detection.
- Packet Filtering
- Deep Packet Inspection
- Automatic database push from manufacturer to our firewall for threats
- SSL/TLS – ILS subscription to Secure Socket Layer/Transport Layer Security Encryption
- Data Encryption / Data-At-Rest – Provides comprehensive encryption over the lifecycle of VM data, from its genesis on a host, through in-use storage on host flash, across networks, and persisted at rest
- Penetration Testing and Vulnerability Compliant
- WAF – Web Application Firewall
- SIEM – Security Information and Event Management
- Multiple layers of highly available, fully redundant, next generation firewalls with intrusion detection system and intrusion prevention system
- Network Management System for monitoring, alerting, and alarming
- Multiple layers of anti-virus protection
- Penetration testing and vulnerability assessment
Document Repository Application Level Security
At the repository application level, ILS performs additional penetration testing for its document review platforms using scanning, infrastructure penetration testing, and application penetration testing
The purpose of the vulnerability scanning is to:
- Identify and fix faults in the software that affect security, performance, or functionality
- Alter functionality or address new threats
- Change software configuration to make it less susceptible to attack, run faster, or improve functionality
ILS regularly performs vulnerability testing, which uses live exploits to examine the infrastructure for vulnerabilities to continually assure the highest level of security and resistance to intrusion threats.