Have any questions? Feel free to contact us:
+1 (877) 238.7891
HIPAA Compliant Hosting
Hosting Management and Security Take the Headache Out of HIPAA Compliance

Hosting Management and Security Take the Headache Out of HIPAA Compliance

HIPAA (Health Insurance Portability and Accountability Act of 1996) requires businesses that process, store or transmit electronic protected health information (ePHI or PHI) to comply with strict administrative, physical and technical safeguards. We offer managed dedicated, VPS, and cloud dedicated solutions compliant with HIPAA guidelines.

Often, the consequences of the loss or compromise of protected health information could cause irreparable damage to a client’s reputation, if not even more serious legal penalties. In order to ensure our clients are protected, we have crafted compliant hosting solutions, making sure technical controls, backup management, safeguards and physical security policies are in place, all to verify that your data is secured to industry standards.

Secure Your Healthcare Data

  • Check MarkWholly owned Core Data Centers
  • Check MarkFully Managed Servers
  • Check MarkLocked Server Cabinets Included
  • Check MarkBusiness Associate Agreement (BAA) Available
  • Check Mark24/7/365 On-Site Support
  • Check MarkOffsite Backup Available
  • Check MarkHigh Availability Infrastructure
  • Check MarkExtensive Administrative, Physical & Administrative Safeguards

HIPAA Compliance: Security & Solutions

Data Center Physical System Security

Minimize Risk of Loss and Theft

  • 24/7/365 Manned Facility
  • Closed Circuit TV Security Cameras
  • Monitored 24/7/365 by 3rd Party Security Company
  • Site Entrance Controlled by Electronic Perimeter Access Card System

Minimize Risk of Damage

  • High Security Facilities
  • Data Centers Privately Owned and Operated
  • Durable, Poured Concrete External Walls
  • Disaster Neutral Geographic Locations

Advanced Fire Prevention Infrastructure

  • Dry Pipe Preaction, Double Interlock System
  • NFPA 13 Compliant

Security Zones

  • Office Space Separate from Data Center Space
  • Advanced Proximity Credentials Required to Access Data Center
  • All Employees Receive Full Background Check
  • Key Locked Physical Server Rack Enclosures Available
  • Component Level Redundancy Available for Hard Drives
  • Hot and Cold Spare On-site Servers Available

Entry Security – Access Controls

  • Exterior Entrances Secured by Mantraps with Interlocking Doors
  • Access to the Data Center Space Requires Secure Credentials

Uninterruptible Power Supplies (UPS)

  • Multiple N+1 MPS Generators
  • Multiple Fuel Contracts Ensure Fuel Availability for Generators
  • Multiple N+1 UPS Systems with 30 Minute Minimum Runtime.
  • Server Chassis Feature Redundant Power Supplies (Available)
  • Server Chassis Have A/B Power Configurations (Available)
  • Redundant ASCO Closed Transition Bypass Isolation Transfer Switches
  • Capability to Provide Tier-4 Power
  • Four 10 Megawatt Feeds Available
  • Diverse Paths from Substation
  • 2N Power Available

SSAE-16 (formerly SAS70) & Safe Harbor Compliant

Network Configuration and Technical Security

Network Device Management

  • Hardware Cisco Firewall Devices Available with Full Management
  • Qualified Engineers Available 24/7/365
  • Assistance with Hardware Firewall Configuration
  • Outbound and Inbound Traffic Filtering Available
  • Intrusion Detection/Intrusion Prevention Modules Available
  • Network Redundancy Ensures Failover
  • Diverse Connectivity Fiber Paths Into Building
  • Dedicated Meet-Me Room
  • Bandwidth Co-Op solutions
  • Carrier Neutral
  • On-net transport to most major global cities

Remote VPN

  • Remote Secure VPN Implementations and Management Available
  • Encryption (Triple DES or AES)
  • Authentication (Site-to-Site VPN Tunnels) with Strong Passwords, Pre-Shared Key and Certificate
  • DMZ Implementations
  • Assistance with Log Management and Monitoring
Backup Management

Protect your data with our fully managed, robust backup solution for Linux and Windows Managed Dedicated Servers. We continuously captures your entire system configuration to an off-site facility for disaster recovery.* Guardian uses replication, synchronization, and point-in-time snapshots to provide protection of your complete server environment, so our Sonar® Monitoring team can recover your exact server configuration in the case of a catastrophic event. When you pair our Guardian backup solutions with our state-of-the-art, secure Data Centers – featuring SSAE-16, PCI compliance, Safe Harbor Certification, and 24x7x365 on-site support – we can ensure unparalleled uptime and safeguard against data loss in even the most extreme circumstances.

  • Check MarkContinuous Backups
  • Check MarkIncremental Snapshots
  • Check MarkBare-Metal Disaster Recovery
  • Check MarkHigh Performance, Low System Impact
  • Check MarkcPanel Administration Plugin
  • Check MarkMySQL Database Plugin
  • Check MarkDisk Safe Data Encryption Available