![]() |
About: Security SAS70
CONNECT WITH SECURITY - SAS70
In today's threat-prone world, an IT solutions company had better be rock-solid secure and reliable. At Great Lake Systems, we've built our technology infrastructure from the ground up to go beyond the expected-higher and more nuanced levels of security and reliability, both in our physical locations and with our hosted services:
Naturally, we also help protect our users against spam and identity theft, while offering complete support in helping you meet your regulatory compliance requirements. Keeping Data Centers SecureWe integrate security into our standard business practices. In order to support compliance regulations such as PCI, HIPAA and SOX, access to the data center is restricted to pre-approved customers. Any outside vendors are required to follow strict security protocols. We feature biometric access points and video monitoring of activity within the centers. All of our network technicians, engineers and service teams undergo background checks and are security certified. SAS 70 Type II AuditedSAS70 Type II audits provide you with assurance that Great Lake Systems facilities are keeping with today's best practices and standards. Conducted by external accounting firms specializing in Sarbanes-Oxley compliance, a SAS 70 Type I audit verifies that a service provider has documented controls. Type II includes Type I plus an actual audit over a specific period verifying that documented controls are effectively in use. Great Lake Systems partner completed the SAS 70 Type II Audit for all five of our data center locations in Seattle, Everett and Bellingham. While we have always supported high security practices, customers now have added assurance that their information and data is safe with us. Trust in Great Lake Systems Cloud Suite SolutionsWe're in business to do more than just deliver a secure environment for your data and business applications. We're here to provide peace of mind. Our software systems have layered password and encryption protection. Processes and safeguards limit any individual Great Lake Systems employee from accessing sensitive data. Systems log access and log files are regularly reviewed to ensure ongoing security. Unified Certification Standard (UCS) CertifiedThe MSP Alliance created UCS to promote the development and growth of cloud provider and managed service provider industry standards using a common set of standards that businesses can trust. UCS Certification provides you with a third party validation of our business, operations, security, customer service and support processes. To achieve UCS Certification, the independent audit verified that:
An innovator in delivering cloud-hosted products, Great Lake Systems UCS Certification gives you confidence that we meet or exceed stringent standards that have undergone an independent audit. Learn More Contact us today to learn how Great Lake Systems can enhance your business. Call 855-484-6784 or fill out our contact form. | ![]() |