Cloud Compliance

 

Security and Conformity

At C2 Enterprise, we know you care about data security and compliance standards. Providing an high-performance application, C2 ATOM has been built around a secure, multitenant network architecture hosted in fully compliant third-party environment.

With robust product security features, redundant architecture, daily back-ups and continuous monitoring potential, your clients’ data and yours is safe with us.

We deliver flexible, intuitive and efficient service desk hosted solutions, exceeding the industry best practices.

 

PERIMETER SECURITY

  • A secure, multitenant network architecture
  • Active performance and availability monitoring of all data centers 24x7x365
  • Encrypted offsite backups
  • DDOS mitigation technologies
  • SSAE 16 SOC 2 Type II compliant data centers

 

C2 ATOM APPLICATION SECURITY

  • Role-based application security with flexible single sign-on
  • Restricted IP access and database patching
  • Customized password complexity
  • Roles and permissions
  • Audit logging and event alerting

 

NETWORK SECURITY

  • Secure network architecture
  • Layered redundancy
  • Firewall and boundary
  • Network security scanning
  • Security incident event management system
  • Resilient, dense network access
  • Regular audits and intrusion detection
  • Systems security monitoring 24x7x365

 

PHYSICAL SECURITY

  • Top connectivity Provider with compliant facilities
  • Relentless data center Infrastructure with superior redundancy
  • DCIM platform to continually monitor service to ensure business continuity
  • Dynamic 24/7 customer support
  • PCI DSS Level 1 compliant
  • ISO 27001 certificate

 

TRANSMISSION SECURITY

  • Access point via HTTP or HTTPS using SSL
  • 2048-bit SSL Secure Sockets Layer with TLS Encryption
  • Solid vetting to ensure strong Authentication
  • Full data protection
  • Additional safeguards protection
  • Advanced methods that helps protect users while they access web portal and mobile app

 

ACCESS CONTROL

  • Access rights and authentification control
  • Granular access privilegs
  • Customer data segregation
  • Network IP restrictions
  • User identity credentials
  • Qualified security tools to review potential harmful vulnerabilities
  • Dedicated, experienced security team

 

We support and protect thousands of users every month. C2 Enterprise creates software that fuels transformation for companies and enables them to operate strong service and support. Software is at the heart of every business, in every industry.

From development to management and security, C2 is working with organizations and partners to provide efficient service desk across mobile, private and public cloud.