FOR MORE INFO:
W W W . A B O U T I T . C O . Z A / 0 8 6 1 4 6 0 1 0 0
Cost efficiency, ease of implementation, and outstanding Recovery Time Objectives (RTOs) are key reasons
to implement cloud data protection solutions
Since 2003, About IT has offered industry-leading disaster recovery solutions to businesses of all sizes.
Today, law firms, banks, financial institutions — and other organizations with extreme data sensitivity,
high security requirements, and zero tolerance for data loss and downtime — trust About IT to protect their
business-critical systems and data.
About IT has unparalleled experience in designing and executing critical data protection solutions. About IT
Cloud data centers leverage sophisticated enterprise-level security, privacy, and compliance mechanisms
for organizations of all sizes. Few of the more than 500,000 About IT business customers can implement
the same level of security on their premises, or in their private clouds, using their own resources.
This document describes About IT’ stringent privacy and data security policies and practices regarding
the confidentiality and safety of your data. Given the accelerating rate of change in the information
technology industry and its ever-evolving capabilities, technical details in this white paper are subject to
change. What never changes is About IT’ unwavering dedication to protect your data.
ABOUT IT CLOUD DATA CENTERS: A PRIMER ON SECURITY, PRIVACY, AND COMPLIANCE
cyber-attacks. About IT controls and monitors its boundary, DMZ networks, VPN and remote connections,
and internal flows. About IT utilizes automated tools in conjunction with organizational controls to guard
against human interventions.
The About IT network is multi-layered and zone-based. Its customers and internal environments are fully
About IT provides real-time encryption for all data transferred between customers and data centers,
About IT employees and data centers, and between the data centers themselves. This provides the best
protection for network interaction between office-based users and data centers.
To protect against malware, About IT uses the most modern web application firewall. It includes instant
protection against SQL injection, cross-site scripting, unauthorized resource access, remote file inclusion,
and other OWASP (Open Web Application Security) threats.
About IT’ enterprise-grade network security is designed to prevent even the most sophisticated attacks,
and offers a level of protection that is extremely difficult for small-to-medium businesses (SMBs) to
achieve in their on-premise facilities.
Security starts at the About IT Data Centers. About IT hosts data and cloud products at trusted data centers
that are physically distributed around the globe — in the U.S., UK, Switzerland, France, Germany, Russia,
Japan, Singapore, and Australia.
Respected, non-About IT accreditation organizations regularly audit About IT Data Centers
to ensure support of various certifications. These standards include:
- ISO/IEC 27001
- ISO/IEC 9001
- SSAE 16, Types 1 & 2
- PCI DSS
About IT Data Centers and About IT technology are physically supported
and secured 24/7, 365 days to protect against potential attacks using:
- Access control cards
- Biometric access control systems
- Fire suppression systems
- Surveillance cameras and notification systems, such as intrusion detection sensors,
heat sensors, and smoke detectors
Similar measures protect About IT business offices and headquarters as well.
About IT employs the highest standards of physical security at About IT Data Centers, protecting the
safety of customer data. The level of protection from intruders exceeds anything that small to medium
businesses can hope to implement alone.