Our CS20 cloud content services platform infrastructure and applications pass the most stringent security audits. Whether you need a content sharing and document management and workflow solution for 5 or 5,000 users, CS20 cloud enables them to work with content wherever and with anyone inside and outside the organisation.
Multiple levels of security
Our primary data centre is ISO 27001 accredited. The servers are hosted in secure facilities, operated by Secura, with restricted access and 24/7 monitoring.
Servers are hosted behind sophisticated firewalls, with a protected perimeter. We carry out penetration testing on an ongoing basis, and have had formal penetration testing commissioned on a number of occasions by third parties.
Access to workspaces and files is restricted, with full administrative control.
To secure data, most systems use a combination of techniques, including:
- Encryption, which means they use a complex algorithm to encode information. To decode the encrypted files, a user needs the encryption key. While it’s possible to crack encrypted information, most hackers don’t have access to the amount of computer processing power they would need to decrypt information.
- Authentication processes, which require to create a user name and password.
- Authorization practices — the client lists the people who are authorized to access information stored on the cloud system. Many corporations have multiple levels of authorization. For example, a front-line employee might have very limited access to data stored on a cloud system, while the head of human resources might have extensive access to files.
Working with the world’s leading hosting provider Racksapce TIW have created a Hybrid Cloud that delivers the highest level of security whilst maintaining the flexibility of the a virtualised environment. Our production environment is all based on named servers, a back bone Fibre San at Raid 10 level all fully load balanced behind top level firewalls. Yet through the hybrid we can add on new servers inside 6 minutes should demand dictate all being managed from within the private environment.
Single sign on is critical to both the user experience and security with CS20 you get a full Active Directory connection, this can be further enhanced by your own VPN should you require it.
Highest level security and reliability
- Encryption: All transmissions to and from CS20 including sign-on are encrypted at 256-bit through SSL via HTTPS.
- All data replicated in real time Highly scalable and redundant online infrastructures.
- ISO 27001 Accredited.
- SAS 70 Type II.
TIW’s Private Cloud content services platform, infrastructure and applications pass the most stringent security audits. Whether you need a content sharing, workflow and document management solution for five or 50,000 users, CS20 cloud DMS enables them to work with content universally. TIW manages the infrastructure to efficiently host the documents and processes your organisation demands. TIW will perform automatic backup scans and updates to guarantee saving of documents, as well as ensuring data authenticity at all times. CS20 is hosted in the UK, with security of paramount importance. CS20 has built in password protection, data encryption, account lockouts and audit trails, which tracks transactions of all users from uploading, accessing, editing, etc. of documents. With up to nine levels of permissions, CS20 offers refined hierarchies to prevent unauthorised access. Assign roles and groups to control whether users can see documents, view their contents, and modify or delete them.
CS20 is hosted by Secura, a leading provider of cloud services. Fully ISO 27001 and SAS Type II accredited ensure security and peace of mind at all times.
Key features at a glance
- VeriSign’s encryption & Secure Sockets Layer (SSL)
- Folder and document level access restrictions
- Annual third party application security assessments
- Load-balanced internet server farm
- Operating systems adhere to standards set by the Centre for Internet Security
“We looked at various options for connecting to the A&S repository using DRI and decided to use TIW for the versatility of their service and how it will assist with other reforms like Electronic Claims Files (ECF). There was a particular need to consider how, as an organisation, we could centralise, store and audit electronic documents for A&S and ECF. The TIW service offers us a cost effective route to achieving this without significant change to our current processes or further development”.