IST DocStor: Security

Innovation • Service • Technology • Passion

Contact

Talent Acquisition Team

Security

 IST DocStor:

IST DocStor tracks and reports on all activity within the system. During the IST DocStor implementation, IST creates customized security rights designed to meet your needs. IST DocStor security can be set to allow individuals to view specific employee folders and files, ensuring that only managers with the appropriate security clearance can view sensitive employee information.

Additionally, the most valuable aspect of IST DocStor’s advanced reporting is that IST DocStor provides real-time usage tracking reports identifying which users have accessed which documents, when, for how long, and what actions they have taken (i.e. printing, modification etc.).

Data Encryption

Data Center

Physical Security

Separation of Information

Prohibited Removal Media

Employee Background Checks

Ethical Walls

Network Security

Files are encrypted in transit (SSL-128) and at rest (AES-256) on FIPS-140-2 Certified media.

VPN and active directory controls use two-factor VPN authentication to prohibit removable media from access storage.

All employees undergo extensive background checks including financial, criminal, drug ID and figure printing.

Information and access is kept separated across hardware, engineers and support staff.

Single point of entry, coded key cards, biometric fingerprint and iris scanners, on-site security force and surveillance cameras.

N+1 state-of-the-art, fully redundant data center.

User and group based ethical walls security for access rights and permissions to documents.

Adhere to the highest security principals and disciplines, validated by our annual PEN test and SOC 2 Type 2 Audit.

Security Features

IST DocStor has partnered with QTS Data Centers the world leader in providing secure and compliant IT infrastructures for data-centric enterprises and federal agencies.  All information is stored on IST hosted servers located at Quality Tech’s state-of-the-art fully redundant co-location data center that guarantees 365 days a year, 24 hours a day, 7 days a week accessibility, as well as, disaster recovery in the event of an unforeseen catastrophic event.

  • Utility power is provided via four (4) independent redundant Georgia Power feeds
  • All building entrances require card key access. Data center floor and secured areas require card key and two-factor biometric authentication (fingerprint and iris scan)
  • QTS Security Guards on-site 24x7x365; Active patrol both inside and outside facility
  • Over 100 closed circuit video cameras cover the interior and exterior of building
  • Facility engineers on-site and available by pager. Engineers trained to control and maintain all critical facility components
  • Critical power systems are monitored and controlled by Square-D automated management system
  • Data center air temperature and humidity is monitored and controlled by Trane Tracer Summit Systems
  • Fire detection and suppression is managed by Cheetah Systems in tandem with VESDA

Data Centers

Digital Encryption and Security Compliance

IST DocStor uses only the latest in digital encryption to protect your assets at all times.  Documents are safeguarded using SSL-128 encryption while in transit and AES-256 encryption while at rest.  In addition, all your files are stored on FIPS-140-2 Certified media in accordance with the cryptographic information processing standards of the National Institute of Standards and Technology for U.S. government and other regulated industries.

 

IST DocStor has partnered with the AICPA to perform annual SOC 2 Type 2 audit testing on all of our systems and processes to assure that we are always adhering to best practices to safeguard your digital assets.  In addition, IST performs 3rd party penetration tests on our system, confirming our digital security is meeting all safety standards.