One of the questions we are most frequently asked by potential customers is: “Will my data be secure?”. Companies want to know that their data will be protected from hackers and ask us to prove how we’ll do this.
In the early days, this was generally because IT teams didn’t trust digital clouds. However, with Microsoft and Amazon becoming the two largest providers of cloud services globally, they’ve helped to establish confidence in the cloud being a secure environment for storing data.
Cloud-based data storage provides many benefits including flexibility, scalability and reliability, allowing for more computing power, additional storage or further services to be added as needed.
Security in the cloud is also recognized as superior to on-premises, with broad security certification and accreditation, data encryption, severe backup and disaster recovery policies and strong data center physical security all providing a more secure way to manage companies’ IT infrastructure.
With our Digital Twin platform, Cintoo Cloud, we provide complete flexibility around our cloud options. For customers with confidential or sensitive projects, where data sovereignty regulations or the law dictates that the project data must be physically stored within a particular country’s borders, they can choose the cloud provider (Microsoft Azure or Amazon Web Services) and the data center geography they want the project data to be stored in.
So, with trust in cloud-based storage established, what is the number one concern for IT departments today? It’s how their data could potentially be used if it’s not properly protected. This is why at Cintoo we take cybersecurity very seriously, assuring our customers that your data is safe at all times.
As of September 30th, 2020, Cintoo is now SOC2 Type 1 compliant, demonstrating that our process is highly secure. This encompasses the way we develop the software, train our team, segment the information, and control the publishing process. The examination into Cintoo Cloud was conducted by a renown US-based auditor in accordance with attestation standards established by the American Institute of Certified Public Accountants (AICPA). As part of this SOC2 compliancy, we also only use SOC2 Type 2 suppliers, such as Amazon Web Services or Microsoft Azure.
Furthermore, we use penetration testing to assure our customers that their data is cyber secure. We use a specialized company whose experts try to hack our system every six months. At the end of the test, we are provided with a report to confirm that despite trying by all means to hack our system they were unable to do so.
Both of these SOC2 Type 1 and Pen Test reports can be provided to our customers’ IT teams upon signing an NDA.
Different organizations have different cloud requirements, determined by the IT strategy, existing infrastructure and security policies. Talk to us about how our flexible cloud options can integrate with your set-up, enabling your teams to start benefitting from Cintoo Cloud through improved management and sharing of point cloud data: www.cintoo.com / firstname.lastname@example.org