Cloud security at ContourCloud is the highest priority. As a ContourCloud customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations.
An advantage of the ContourCloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need without the upfront expenses and at a lower cost than in an on-premises environment.
Contour provides several security capabilities and services to increase privacy and control network access. These include:
Availability is of paramount importance in the cloud. Contour Cloud customers benefit from Contour Cloud services and technologies built from the ground up to provide resilience in the face of DDoS attacks.
Contour offers you the ability to add an additional layer of security to your data at rest in the cloud, providing scalable and efficient encryption features. This includes:
Contour Cloud provides tools and features that enable you to see exactly what’s happening in your Cloud environment. This includes:
These tools and features give you the visibility you need to spot issues before they impact the business and allow you to improve security posture, and reduce the risk profile, of your environment.
Contour Cloud offers you capabilities to define, enforce, and manage user access policies across Contour services. This includes:
Yes, Contour requires anyone with access to customer information in your organizations electronic systems to attend information security awareness training
Contour has a password management policy that includes password strength, age, complexity, history, retry, attempts, and lockouts
Contour has multi-factor authentication requirements for all remote access and internet-facing infrastructure
WPA2 encryption and enterprise authentication
Contour performs internal vulnerability and penetration testing
Contour has technical controls in place to control users’ storage access and/or transport data outside of the organization’s business premise
Contour carries insurance for cyber-security and data privacy
Yes, Contour segregates the corporate wireless network and the guest wireless network