DaaS Data Security
At HOSTED DESKTOP your data is protected to the highest possible security level our servers are located in the most secure data centers in the country. The data centers we leverage are Both sites are certified to ISO27001 and PCI DSS security standards.
The Data Centers we leverage are guarded 24×7 with security personnel and are tracking all possible threats that could compromise the availability and fidelity of your business data.Our data center partners manage facilities are state-of-the-art including some that are nuclear bomb proof as they are formerly owned facilities of the United State Department of Defense. Many have benefited from significant financial investments in the tens of millions of dollars including additional investment in power and cooling. All of this investment delivers an environment for your business data that is resilient and secure. All data centers have control over security, power, cooling, access, maintenance, and do not allow
unescorted access onto the data floors.
All transmissions over the Internet to and from your hosted desktop are encrypted. Additional protection is provided by enterprise grade firewalls on our network, with anti-virus software and intrusion detection on our systems to monitor and block any unauthorized access. Each customer’s data is partitioned in separate storage containers to ensure there is no possibility of unauthorized access. We use randomly generated passwords. The only people with access to your data, outside of your organization, are our staff with restricted access provided to certain trusted software providers as and when necessary once authorized by the customer. All data stays in the UK. With your business data never leaving the secure hosted desktop environment, there is no risk of it being stolen on a portable device such as a laptop. Desktop hosting offers unparalleled data safety and security, which cannot be matched by a normal desktop PC set up.
Two-factor authentication provides an extra layer of security to your local and remote logins. We use your phone system to provide a unique authentication password to login.
The authentication process:
1. Enter username and password
2. Choose how to authenticate:
– One tap authentication – sent direct to your smartphone
– Request passcode via SMS – enter code on screen
3. You’re are logged in.