This is a solution we customize based on your organizational needs. Let's discuss what works the best for your organization.

vTech is positioned to provide high-performance security to protect the virtualized data center and extended cloud with firewall and intrusion prevention services (IPS) capabilities. Cloud Security helps you safely and confidently leverage cloud computing services and solutions.

We offer industry-leading best practices in the design and management of online services.

To protect your environment and data, we follow the security management and development lifecycle. Security Development Lifecycle (SDL) means designed and built from the ground up using a comprehensive approach for writing more secure, reliable and privacy-enhanced code.

Features You Will Enjoy With vCloud Security

Datacenters are physically constructed, managed, and monitored around-the-clock, all year long to shelter data and services from unauthorized physical access as well as environmental threats. Our data centers are PCI-DSS and Safe Harbor compliant in addition to having SSAE16 Type II, SOC1, SOC2 (Security and Availability Only), and SOC3 audits on file for all data center facilities.
Operating around the clock all year long, our event and Incident Response team helps to mitigate threats from attacks and malicious activity.
Security is monitored with the aid of centralized monitoring, correlation and analysis systems. These manage the large amount of information generated by devices within the cloud environment and provide timely alerts. Multiple levels of monitoring, logging, and reporting are available to provide maximum visibility.
Integrated deployment systems manage the distribution and installation of security patches. Customers can apply similar patch management processes for virtual machines.
Anti-malware is built-in to Cloud Services and can be enabled for virtual machines to help identify and remove viruses, spyware and other malicious software while offering real-time protection. In addition, customers may run anti-virus & anti-malware solutions on their virtual machines.
With our Intrusion Detection and Prevention Systems, denial of service attack prevention, regular penetration testing, and forensic tools, we can identify and mitigate threats from both inside and outside.
By default, our systems are set up to deny access of customer data to operations and support personnel. For those who are granted access, this process is carefully managed and logged. All data center access to the systems that store customer data is strictly controlled via lock box processes. As a client, you can choose to assign multiple deployments to an isolated Virtual Network and allow those deployments to communicate with each other through private IP addresses. Clients can also establish private connections to datacenters, keeping their traffic off the Internet. Network isolation is used to prevent unwanted communications between deployments while access controls block unauthorized users. Virtual Machines do not receive inbound traffic from the Internet unless customers configure them to do so.
Built-in SSL and TLS cryptography enable customers to encrypt communications within and between deployments from on-premises datacenters and from administrators and users. By offering a wide range of encryption capabilities up to AES-256, we are able to provide customers the flexibility they need to implement the methods that best meet their requirements.
All of our processes have been validated for PCI-DSS compliance by an independent Qualified Security Assessor (QSA). This helps prevent fraud by implementing increased controls involving credit card data. Identity and Access Our Active Directory enables our customers to manage their access to a world of cloud apps while multi-factor authentication and access monitoring offer you enhanced security.
Active Directory enables customers to manage access to a world of cloud apps. Multi-factor authentication and access monitoring offer enhanced security.

Shared Responsibility

We are responsible for the platform and endeavors implemented to provide a cloud service that can meet the security, privacy and compliance requirements of our customers. However, we need your help in protecting your environment once the service has been provisioned, including the applications, data content, virtual machines, and access credentials, among other things.

This is a solution we customize based on your organizational needs. Let's discuss what works the best for your organization.