Data Hosting

ADAVICO utilizes some of the most advanced technologies available to store and secure client data. Three critical areas of security - physical, system, and operational - are addressed to ensure maximum protection. And because data safety is such an important factor in our business, your confidential information is hosted in a world-class server environment professionally managed by a recognized leader in high-end hosting.

SOC 1 Audit

Data is stored in data centers that have successfully completed the SSAE 16 Type II SOC 1 formal examination of processes, procedures, and controls by an independent auditor including security monitoring, change management, service delivery, support services, backup and environmental controls, and logical and physical access.

Server Backup

Fast, secure, automatic, online backups prevent data loss. Data is AES-256 encrypted before it leaves the server and while stored. Files can be restored as they existed during a specific point-in-time in case of loss or user corruption, while disaster recovery plans are supported by storing mission critical data offsite.

Network Uptime

A number of network features are implemented to improve uptime, which we closely monitor:

  1. Partnerships with nine network providers to provide multiple redundancies in data flow to/from data centers
  2. Dedicated hosting network not shared with telecom or cable TV services
  3. Separate data center entry points for each fiber carrier
  4. Only high performance bandwidth used

Physical Security:

  1. Access limited to data center technicians
  2. Biometric scanning
  3. Security camera monitoring
  4. 24/7 onsite staff
  5. Unmarked facilities
  6. Physical security audits by independent firm

System Security:

  1. System installation using hardened, patched OS
  2. System patching configured to provide ongoing protection from exploits
  3. Dedicated firewall and VPN services to help block unauthorized access
  4. Data protection with managed backup solutions
  5. Dedicated intrusion detection devices help protect against unauthorized system access
  6. Risk assessment and security consultation by professional service teams

Operational Security:

  1. ISO17799-based policies and procedures regularly reviewed as part of SSAE 16 audit
  2. Access to confidential information restricted to authorized personnel
  3. System access logged and tracked
  4. Secure document-destruction policies for all sensitive information
  5. Fully documented change-management procedures
  6. Independently audited disaster recovery and business continuity plans