Data Center

Highest Security, Reliability, Data Privacy

ILS’ state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry (man-trap) containment, electronics, biometrics, key cards, and 24/7 video surveillance and full time Network Operations Center. Our multiple data centers provide second site backup and disaster recovery faculties, assuring against data loss.

As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. Multiple power grids, backup systems and diesel-powered generators assure that your data will remain accessible even if local power fails. Multiple ISP contracts assure that network outages can be switched over to a different provider, drastically reducing the chance for connectivity issues. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures and internal policies.

High Level Nerd Factors

ILS secures its network with the following tools:

ILS’ state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry (man-trap) containment, electronics, biometrics, key cards, and 24/7 video surveillance and full time Network Operations Center. Our multiple data centers provide second site backup and disaster recovery faculties, assuring against data loss.

As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. Multiple power grids, backup systems and diesel-powered generators assure that your data will remain accessible even if local power fails. Multiple ISP contracts assure that network outages can be switched over to a different provider, drastically reducing the chance for connectivity issues. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures and internal policies.


Strict access controls via an active directory

24/7/365 monitoring for possible vulnerabilities, malware sampling, malicious events, DDOS attacks, blacklisted websites, and front-end anti-virus protection

Gateway Security Intrusion Detection

Packet Filtering

Deep Packet Inspection

Automatic database push from manufacturer to our firewall for threats

SSL/TLS - ILS subscription to Secure Socket Layer/Transport Layer Security Encryption

Data Encryption / Data At Rest - Provides comprehensive encryption over the lifecycle of VM data, from its genesis on a host, through in-use storage on host flash, across networks, and persisted at rest

Penetration Testing and Vulnerability Compliant

WAF – Web Application Firewall

SIEM - Security Information and Event Management

Multiple layers of highly available, fully redundant, next generation firewalls with intrusion detection system and intrusion prevention system

Network Management System for monitoring, alerting, and alarming

Multiple layers of anti-virus protection

Penetrating testing and vulnerability assessment

Document Repository Application Level Security

At the repository application level, ILS performs additionally penetration testing for its document review platforms using scanning, infrastructure penetration testing, and application penetration testing. The purpose of the vulnerability scanning is to:

Identify and fix faults in the software that affect security, performance, or functionality;

Alter functionality or address new threats;

Change software configuration to make it less susceptible to attack, run faster, or improve functionality

ILS recently performed vulnerability testing, which used live exploits to examine the infrastructure for vulnerabilities, and confirmed no current vulnerabilities exist.

Constant Vigilance

ILS regularly performs vulnerability testing, which used live exploits to examine the infrastructure for vulnerabilities to continually assure the highest level of security and resistance to intrusion threats.

LIVE CHAT