Security & Privacy 

    Our solutions and ReMAD platform are actively in use by security-conscious small businesses to large multi-national organizations in highly regulated industries such as finance, legal services, energy, government, and healthcare. 

    They have been designed and implemented with our customer’s privacy and security at the forefront and adhere to rigorous compliance standards in the US and EU such as GDPR, CCPA, and HIPPA.

    21972-312_SOC_NonCPA

    High Security

    To maintain our Information Security Program, we leverage OneTrust Certification Automation. Our security policies and procedures have been examined for SOC2 Type 2 - Security, Availability, Processing Integrity, Confidentiality and Privacy compliance by an independent systems auditor. 

    Industry Standard

    Cloudficient utilizes Tier 4 ISO27001 certified datacenters to host all our solutions. These adhere to the highest standards for data availability and physical security controls.
    All data is transmitted using industry standard secure transport mechanisms and is encrypted at rest.

    Segmented Data Access

    Our products allow data access to be segmented from the management portals.

    This enables us to administer our solutions without having access to any sensitive or confidential customer data. 

    Additional Resources

    Cloudficient can provide the following security related documents if they are relevant to your migration or eDiscovery project. These include:

    • SOC 2 Type 1 Document
      • Covers the Security Trust category
    • SOC 2 Type 2 Document
      • Focuses on specific security controls related to customer data protection. It assesses the effectiveness of controls related to security, availability, processing integrity, confidentiality, and privacy.
    • Cloudficient Security Policies
      • High level document covering the contents of our security policies.
      • Detailed Security Policy document
    • Security Overview Document
      • Per each software solution
      • Description of the solution, components, data flow diagrams and security mechanisms.
    • Microsoft Azure and Hetzner Cloud ISO 27001 Reports
      • Assures that the datacenters we leverage for our solutions have been certified to meet the highest standard for information security management
    • CAIQ-lite
      • Self Assessment designed by the Cloud Security Alliance. Covers 16 controls to assess the security of cloud vendors.
    technology_no_134

    The ReMAD Platform itself consists of several containerized microservices hosted in vendor-agnostic Kubernetes clusters. Resources on the cloud backend may be scaled individually depending on the actual load required. 

    For example, if more computing power is required to handle the additional load of more incoming provisioning requests, the microservice which is responsible for provisioning would automatically scale up. This scalability is key to achieving performance for demanding project timelines.

    ReMAD Platform

    Cloudficient technology contains a cloud backend, called the Cloudficient ReMAD Platform, which serves as “command and control” of the solution.

    ReMAD_neg_Asset 7@2x

    The cloud backend orchestrates the migration project by keeping track of every user and step of their desired workflow, all while maintaining chain-of-custody tracking for every migrated item to ensure complete project governance.

    All Cloudficient solutions are based on the Cloudficient ReMAD Platform and follow the same principles. 

    The ReMAD Platform is hosted in Microsoft Azure and stores only limited metadata (e.g. Specific AD attributes) as required. At no point does any data content/payload leave the customer’s security boundaries

    Within the relevant management portal, only limited metadata is visible enabling Cloudficient delivery engineers to appropriately control and manage the migration process.