Data Center

Highest Security, Reliability, Data Privacy

ILS’ state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry (man-trap) containment, electronics, biometrics, key cards, and 24/7 video surveillance and full time Network Operations Center. Our multiple data centers provide second site backup and disaster recovery faculties, assuring against data loss.

As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. Multiple power grids, backup systems and diesel-powered generators assure that your data will remain accessible even if local power fails. Multiple ISP contracts assure that network outages can be switched over to a different provider, drastically reducing the chance for connectivity issues. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures and internal policies.

High Level Nerd Factors

ILS secures its network with the following tools:

ILS’ state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry (man-trap) containment, electronics, biometrics, key cards, and 24/7 video surveillance and full time Network Operations Center. Our multiple data centers provide second site backup and disaster recovery faculties, assuring against data loss.

As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. Multiple power grids, backup systems and diesel-powered generators assure that your data will remain accessible even if local power fails. Multiple ISP contracts assure that network outages can be switched over to a different provider, drastically reducing the chance for connectivity issues. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures and internal policies.


Strict access controls via an active directory
24/7/365 monitoring for possible vulnerabilities, malware sampling, malicious events, DDOS attacks, blacklisted websites, and front-end anti-virus protection
Gateway Security Intrusion Detection
Packet Filtering
Deep Packet Inspection
Automatic database push from manufacturer to our firewall for threats
SSL/TLS - ILS subscription to Secure Socket Layer/Transport Layer Security Encryption
Data Encryption / Data-At-Rest - Provides comprehensive encryption over the lifecycle of VM data, from its genesis on a host, through in-use storage on host flash, across networks, and persisted at rest
Penetration Testing and Vulnerability Compliant
WAF – Web Application Firewall
SIEM - Security Information and Event Management
Multiple layers of highly available, fully redundant, next generation firewalls with intrusion detection system and intrusion prevention system
Network Management System for monitoring, alerting, and alarming
Multiple layers of anti-virus protection
Penetrating testing and vulnerability assessment

Document Repository Application Level Security

At the repository application level, ILS performs additionally penetration testing for its document review platforms using scanning, infrastructure penetration testing, and application penetration testing. The purpose of the vulnerability scanning is to:

Identify and fix faults in the software that affect security, performance, or functionality
Alter functionality or address new threats
Change software configuration to make it less susceptible to attack, run faster, or improve functionality

ILS recently performed vulnerability testing, which used live exploits to examine the infrastructure for vulnerabilities, and confirmed no current vulnerabilities exist.

Constant Vigilance

ILS regularly performs vulnerability testing, which used live exploits to examine the infrastructure for vulnerabilities to continually assure the highest level of security and resistance to intrusion threats.

LIVE CHAT