Data Center

ILS’ state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry containment, electronics, key cards, and 24/7 video surveillance.

As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures and policy. ILS secures its network with the following tools:

Strict access controls via an active directory

24/7/365 monitoring for possible vulnerabilities, malware sampling, malicious events, DDOS attacks, blacklisted websites, and front-end anti-virus protection

Gateway Security Intrusion Detection

Packet Filtering

Deep Packet Inspection

Automatic database push from manufacturer to our firewall for threats

SSL/TLS - ILS subscription to Secure Socket Layer/Transport Layer Security Encryption

Data Encryption / Data At Rest - Provides comprehensive encryption over the lifecycle of VM data, from its genesis on a host, through in-use storage on host flash, across networks, and persisted at rest

Penetration Testing and Vulnerability Compliant

WAF – Web Application Firewall

SIEM - Security Information and Event Management

Multiple layers of highly available, fully redundant, next generation firewalls with intrusion detection system and intrusion prevention system

Network Management System for monitoring, alerting, and alarming

Multiple layers of anti-virus protection

Penetrating testing and vulnerability assessment

Document Repository Application Level Security

At the repository application level, ILS performs additionally penetration testing for its iCONECT XERA document review platform using scanning, infrastructure penetration testing, and application penetration testing. The purpose of the vulnerability scanning is to:

Identify and fix faults in the software that affect security, performance, or functionality;

Alter functionality or address new threats;

Change software configuration to make it less susceptible to attack, run faster, or improve functionality

ILS recently performed vulnerability testing, which used live exploits to examine the infrastructure for vulnerabilities, and confirmed no current vulnerabilities exist.