The Blueprint for Security Assurance

Secure the Boundary

Defense in depth for your data begins at the boundary of your cloud provider’s infrastructure. Defense in depth, a strategy that originated in the military, will help you stay ahead of the latest security threats and meet the most stringent regulatory and compliance requirements. Leveraging FISMA and FedRAMP principals and controls, Recovery Point’s boundary security incorporates a comprehensive security framework based on defense in depth strategies that utilize next generation processes and technologies. Dedicated Security Operations Center (SOC) analysts, led by CISSP credentialed ISSO management, use threat intelligence and advanced analytics 24x7x365 to detect and remediate threats at the perimeter on your behalf. Built-in security includes the latest in:

All of our single-purpose sites feature robust physical security, including badge/photo ID access, biometric screening, escort-only datacenter entry protocols, video surveillance and 24x7x365 on-site staffing.

Our security processes and controls have undergone rigorous third-party security controls assessments (SCA) to verify compliance with the NIST 800-53 FISMA Moderate Guide for Security Controls for Information Systems. We are also an approved FedRAMP Ready provider.

Secure The Content

Information Security Assurance in the digital age is a shared responsibility. Within the security compliance framework, we provide you with the tools and services necessary to operate secure, reliable and cost-effective systems in the cloud. Our extensive Cloud Service Catalog provides the tools for you to implement architectural best practices and apply security at all layers to safeguard the security of your data. Tools include:

Security is built into Recovery Point’s cloud services from the ground up and into every phase of our services delivery architecture. Leverage our resources to meet your requirements for privacy, compliance and risk management with best practices tools and processes designed to defend against bad actors on the internet.

With Recovery Point’s services, you can easily deploy best practices tools to secure your operating systems, networks, platforms and data. Get the security you need, when you need it, without the need to incur costly capital outlays.