Select Page

CSP’s Cloud Workspace solution handles security at a variety of levels and in a number of different ways.

Encryption: 256 BIT AES SSL (TLS 1.0) will be used for server authentication and for encrypting all data transferred between the server and the client. At the storage layer we use Encryption to protect data while at rest.

Protection: At a file level, antivirus and malware is kept up to date and active. The client data in the cloud workspace is protected physically at the SOC compliant data center. Client data and systems are protected logically using a industry best practices and proprietary software. Enterprise class hardware and virtualization software are used to secure client servers.  Group policies and networking rules are scripted to lockdown the end-user experience and prevent unauthorized data access. This is in conjunction with our Disaster Recovery and Business Continuity plan.

Access: Secure RDS Gateways and perimeter firewalls are the initial layers of defense and are actively monitored for malicious activity. CSP maintains logs on who accesses each cloud workspace environment, from what device and when the access was attempted. At the user level file audit logs/reports can be generated to show which user accessed data, when it was accessed and which type of function was performed. Lockout policies and reports prevent unauthorized access from the end point device and force access only through a secure gateway. Additional layers of authentication are also supported.