Security

Helping you succeed, Virtually.

ContourCloud Security

Cloud security at Contour Cloud is the highest priority. As a ContourCloud customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations.

An advantage of the ContourCloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need without the upfront expenses and at a lower cost than in an on-premises environment.

Benefits:

Our Advantages

Matching expectations by assigning the right team at the right tier.

Masters the platforms applications your business uses.

Meaningful escalation prioritizes every service request through a ticketing triage system.

Contour is consistently working to perfect the experience and represent your brand with integrity.

Focus on your business while we focus on your help desk IT support

We Keep You Secure.

Contour help desk IT support will give you the freedom to focus on your core competencies while giving your employees or customers a pleasant, satisfying help desk experience.

Security FAQ's

  • Firewalls
  • Antivirus
  • Anti-Malware
  • Spam Filtering
  • Intrusion Prevention System/Intrusion Detection System
  • Acceptable Use
  • Use of mobile device/BYOD
  • Physical Security
  • Data Disposal/Retention
  • Change Management
  • Risk Management 

Yes, Contour requires anyone with access to customer information in your organizations electronic systems to attend information security awareness training 

  • Servers
  • Workstations
  • Applications
  • Network devices that process, store and/or view data

Contour has a password management policy that includes password strength, age, complexity, history, retry, attempts, and lockouts 

Contour has multi-factor authentication requirements for all remote access and internet-facing infrastructure

WPA2 encryption and enterprise authentication 

Contour performs internal vulnerability and penetration testing 

Contour has technical controls in place to control users’ storage access and/or transport data outside of the organization’s business premise

Contour carries insurance for cyber-security and data privacy 

Yes, Contour segregates the corporate wireless network and the guest wireless network

The Contour team identifies customers’ business goals, budget constraints, and technology integration issues to develop a winning strategy.

Need help?

We are Here To Assist You

Want more information?

Feel free to contact us, and we will be more than happy to answer all of your questions.