VMsources Data SecurityAre you overwhelmed by the idea of comprehensive security for your IT Infrastructure?  Don't be.  Let us help make security more sensible and clear.

We place security at the heart of all operations. Not only did we pioneer a powerful "gateway-less" network design for our Secure Cloud and Business Continuity clients, our proven innovative design provides the bulletproof security of Private Cloud in a fully-managed environment.

Cloud Security relies on order, but that order must come from the intelligent application of principles and standards, as opposed to the endless creation of highly specific rules. 

Let our team will assist your team in understanding the principals of ITSM Cloud Security and Vulnerability Management at a fundamental level.

Download our Intellegent Security PDF: View PDF

What we do to protect Secure Cloud What we do to protect our Clients
  • Edge systems use DUO Multifactor Authentication
  • Strong, randomized passwords for Infrastructure Systems, 24 random characters or longer
  • Comply with NIST 800-63B Digital Identity Guidelines
  • Use dedicated Business Continuity domain for Backup and Infrastructure Systems
  • Use Crowdstrike endpoint protection
  • Encrypt passwords and sensitive and proprietary data
  • Apply Geo-IP Blocklists
  • Impliment true DMZ zones for portals and wevservers
  • True 3-2-1 Rule Backup Compliance
  • Local backups provide fast access to data and are the first component of the 3-2-1 Rule
  • Remote backups provide the second component of the 3-2-1 Rule
  • Veeam Replicas provide the third component of the 3-2-1 Rule
  • We use only Veeam Immutable repository technology
  • Tested and proven by Cohasset Associates meeting the requirements for non-rewritable, non-erasable storage as specified by SEC 17a-4(f), FINRA 4511(c) and CFTC 1.31(c)-(d) – WORM Equivalency
  • Backups are Encrypted in-transit and at-rest
  • That means a Threat Actor will never be able to use your own data against you
  • Backup Repositories exist on dedicated SAN and Networks