Data Center - International Litigation Services

ILS’ state-of-the-art SOC 2 compliant data centers are physically secured with 24/7 security personnel, multi-door entry containment, electronics, key cards, and 24/7 video surveillance.

As an additional security layer, our data centers have two layers of continuously maintained active and redundant firewalls that provide intrusion and malware detection/prevention. ILS maintains a separate and internally secured network, complete with additional redundant firewalls and security infrastructures and policy. ILS secures its network with the following tools:

✔Strict access controls via an active directory

✔24/7/365 monitoring for possible vulnerabilities, malware sampling, malicious events, DDOS attacks, blacklisted websites, and front-end anti-virus protection

✔Gateway Security Intrusion Detection

✔Packet Filtering

✔Deep Packet Inspection

✔Automatic database push from manufacturer to our firewall for threats

✔SSL/TLS - ILS subscription to Secure Socket Layer/Transport Layer Security Encryption

✔Data Encryption / Data At Rest - Provides comprehensive encryption over the lifecycle of VM data, from its genesis on a host, through in-use storage on host flash, across networks, and persisted at rest

✔Penetration Testing and Vulnerability Compliant

✔WAF – Web Application Firewall

✔SIEM - Security Information and Event Management

✔Multiple layers of highly available, fully redundant, next generation firewalls with intrusion detection system and intrusion prevention system

✔Network Management System for monitoring, alerting, and alarming

✔Multiple layers of anti-virus protection

✔Penetrating testing and vulnerability assessment

Document Repository Application Level Security


At the repository application level, ILS performs additionally penetration testing for its iCONECT XERA document review platform using scanning, infrastructure penetration testing, and application penetration testing. The purpose of the vulnerability scanning is to:

✔ Identify and fix faults in the software that affect security, performance, or functionality;

✔ Alter functionality or address new threats;

✔ Change software configuration to make it less susceptible to attack, run faster, or improve functionality

ILS recently performed vulnerability testing, which used live exploits to examine the infrastructure for vulnerabilities, and confirmed no current vulnerabilities exist.