LogicGate Secure Cloud

Securely scale your business automation solutions.

Our Secure Infrastructure

As technology continues to evolve, organizations are increasingly leveraging enterprise cloud computing as a solution for handling their growing data storage and application needs. Utilizing a cloud environment enables organizations to more predictably manage costs, increase availability to advanced technology, rapidly access resources, and mitigate data management risks.

LogicGate utilizes Amazon Web Services (AWS) cloud platform, providing clients with a cost-effective and sustainable infrastructure, which emphasizes business agility, scalability, customization, and best-in-class security. The scale, vast resources, and scrutiny placed on the AWS environment have resulted in an infrastructure that is often more secure than a traditional in-house network or “internal cloud”.

Our customized cloud environment enables organizations around the globe to access, analyze, collaborate and manage large, complex data sets in real time via our web-based solutions.
LogicGate Security

ENCRYPTION

LogicGate believes in using data encryption wherever possible. For many of our clients, encrypting data at rest is a mandatory requirement of security regulations. Our infrastructure automatically encrypts data at rest using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys.

THE CLOUD

Our cloud environment provides rapid access to flexible, efficient, and low cost resources. This means that for a lower cost to you we can deliver an environment with high availability and dependability. Helping to protect the confidentiality, integrity, and availability of our customers’ data is of the utmost importance, as is maintaining customer trust and confidence.

COMPLIANCE

SOC 1 / SSAE 16 / ISAE 3402 (formerly SAS 70) / SOC 2 / SOC 3 / FISMA, DIACAP, and FedRAMP / DOD CSM Levels 1-5 / PCI DSS Level 1 / ISO 27001 / ITAR / FIPS 140-2 / MTCS Level 3 / HIPPA / Cloud Security Alliance (CSA)

NETWORK SECURITY

Protection including Secure Network Architecture, Secure Access Points, Transmission Protection, Fault Tolerant Design. Full suite of network monitoring and protection including:

  • Denial Of Service (DDoS) Attacks
  • Man in the Middle (MITM) Attacks
  • IP Spoofing
  • Port Scanning
  • Packet Sniffing By Other Tenants

  • HIPAA compliance logo

    HIPAA Compliance

    The United States Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that delivers standardized data privacy and security provisions for protecting patient medical information. LogicGate provides our client's in the healthcare industry the administrative, technical, and physical safeguards to support HIPAA compliance. Read more about LogicGate and HIPAA compliance.

    Download our security whitepaper to learn more

    Download Whitepaper