Ademero – Content Central Hosted Edition Datasheet
Download

ContentCentral-Document-Management-Software_and_Google-Cloud-Platform-Logo

Industry-leading, secure, and fully
featured for all enterprises

Have Questions?
1-888-276-2914

24-7_hosted-support

Content Central - Hosted Edition

Hassle-Free Document Management

Take Content Central to the next level with a hosted solution for rapid remote access, anytime you need it. Ademero works closely with Google Cloud Platform to provide secure data-center facilities for your documents and information. Our customers and regulators expect independent verification of security, privacy and compliance controls. Google undergoes several independent third party audits on a regular basis to provide this assurance. This means that an independent auditor has examined the controls present in our data centers, infrastructure and operations.  Google has annual audits for the following standards:

black-check
black-check
black-check
black-check

SSAE16 / ISAE 3402 Type II

SOC 2 and SOC 3 Public audit report

ISO 27017

Cloud Security, This is an international standard of practice for information security controls based on ISO/IEC 27002 specifically for cloud services

FEDRAMP ATO FOR GOOGLE APP ENGINE

PCI DSS V3.0

black-check
black-check

ISO 27001

One of the most widely recognized, internationally accepted independent security standards. Google has earned ISO 27001 certification for the systems, applications, people, technology, processes and data centers serving Google Cloud Platform

ISO 27018

Cloud Privacy, This is an international standard of practice for protection of personally identifiable information (PII) in public clouds services

Google Platform Certifications – Google undergoes several independent third party audits to test for data safety, privacy, and security.

Google-Cloud-Platform-Certifications

Technology with Security at its Core

Cloud Platform runs on a technology platform that is conceived, designed and built to operate securely. Google is an innovator in hardware, software, network and system management technologies. Servers are custom-designed with a proprietary operating system and geographically distributed data centers. Using the principles of “defense in depth,” we’ve created an IT infrastructure that is more secure and easier to manage than more traditional technologies.

STATE-OF-THE-ART DATA CENTERS

Google’s focus on security and protection of data is among our primary design criteria. Google data center’s physical security features a layered security model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection. Data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders.

SECURING DATA IN TRANSIT

Data is most vulnerable to unauthorized access as it travels across the Internet or within networks. For this reason, securing data in transit is a high priority for Google. Data traveling between a customer’s device and Google is encrypted using HTTPS/TLS (Transport Layer Security). In fact, Google was the first major cloud provider to enable HTTPS/TLS by default.

STRONG SECURITY CULTURE

Google has created a vibrant and inclusive security culture for all employees. The influence of this culture is apparent during the hiring process, employee onboarding, as part of ongoing training and in company-wide events to raise awareness.

EMPLOYEE BACKGROUND CHECKS

Google verifies their staff’s education and previous employment and performs internal and external reference checks. Where local labor law or statutory regulations permit, Google may also conduct criminal, credit, immigration, and security checks. The extent of these background checks is dependent on the desired position.

OPERATIONAL SECURITY

Far from being an afterthought or the focus of occasional initiatives, security is an integral part of our operations.

VULNERABILITY MANAGEMENT

Google administrates a vulnerability management process that actively scans for security threats using a combination of commercially available and purpose-built in-house tools, intensive automated and manual penetration efforts, quality assurance processes, software security reviews and external audits.

INCIDENT MANAGEMENT

Google Has a rigorous incident management process for security events that may affect the confidentiality, integrity, or availability of systems or data. If an incident occurs, the security team logs and prioritizes it according to its severity. Events that directly impact customers are assigned the highest priority. This process specifies courses of action, procedures for notification, escalation, mitigation, and documentation.

Have More Questions?
visit www.ademero.com for more info

Was this article helpful to you?

Comments are closed.