SlideShare a Scribd company logo
1 of 3
Download to read offline
Datasheet: Achieving Compliance with Axcient
© 2013. Axcient, Inc. All Rights Reserved.
With such high customer expectations and demands, businesses today cannot afford to dedicate a significant amount of time
ensuring the dependability and industry compliance of their data backup solutions. At Axcient, we understand the importance
of having your business files, applications, and systems securely backed up and constantly available. That’s why Axcient
makes achieving compliance as simple as possible with our all-in-one data backup, business continuity, and disaster recovery
solution, built to provide you with the ultimate reliability, usability, and peace of mind.
WE MAKE IT EASY FOR YOU
Laws and regulations are rarely straightforward, but Axcient alleviates much of your industry compliance burden by providing
security measures that meet or exceed most standards. For example:
1.	 Axcient datacenters are SSAE-16 Type II certified and located on opposite North American coasts.
2.	 Our HP-based hardware meets the highest industry security standards for reliability and performance.
3.	 All data is encrypted – both in transit and while at rest – using AES-128 (Advanced Encryption Standard) with a unique
encryption key that meets the government’s FIPS 140-2 standard for top-secret documents.
4.	 Datacenter access is strictly limited and enforced by the use of CCTV, biometric technology, and 24/7 personnel.
5.	 The original version of data and applications, once backed-up, can only be accessed by authorized personnel that
you identify.
TRUST IN AXCIENT
While other backup, business continuity, and disaster recovery solutions are cobbled together by multiple vendors – making
them more time consuming to manage and more likely to corrupt your data – Axcient has built its entire solution in-house,
from the ground up, for the greatest simplicity and most reliable performance.
Axcient’s patent-pending technology includes:
•	 Data Backup and Restore: Your data is stored on an onsite appliance for fast backups and restores, and also
securely replicated offsite. Reverse incremental backups mean the latest versions of your backups are always on top and
easy to find. Brick level restores offer the option to recover specific files within your server when needed.
•	 Business Continuity & Cloud Continuity: In the event of a server outage, you can run servers on the onsite ap-
pliance with a single click until the new hardware is ready. If your entire building or infrastructure is destroyed, you can
quickly virtualize your servers and work off of the secure Axcient cloud.
•	 Disaster Recovery: Your data is protected in the event of a fire, theft, sabotage, hardware failure, or natural disaster in
our secure, offsite datacenter. Use our Cloud Continuity service to keep all of your data and applications available and up
and running in the cloud. Then, use our Bare Metal Restore (BMR) capabilities to bring your continually backed up data back
to your repaired or replaced servers. That means no downtime, no loss of productivity, and no financial loss due to downtime.
AXCIENT HELPS BUSINESSES BECOME INDUSTRY COMPLIANT
The following lists some of the specific regulations that Axcient end-users must frequently comply with and how Axcient helps
end-users meet each of these compliance standards:
HIPAA:
The Health Insurance Portability and Accountability Act (HIPAA) covers a wide range of topics, including specific standards
for securing the privacy of healthcare-related data. Two parts of HIPAA in particular require healthcare providers to maintain
standards for data integrity, data access, and audit controls for Protected Health Information (PHI).
1.	 The HIPAA Privacy Rule: Under the law, organizations must securely and privately store PHI to guard against
reasonably anticipated threats and hazards that could damage the data both in transit and during storage.
2.	 The HIPAA Security Rule: The rule underlines the administrative procedures, physical safeguards, and technical
safeguards required to protect access to PHI.
Achieving Compliance with Axcient
axcient.com 800.715.2339jelecos.com 402.955.0489
© 2013. Axcient, Inc. All Rights Reserved.
With Axcient, healthcare providers can easily meet or exceed HIPAA requirements because the Axcient solution encrypts data
every step of the way and does not require or involve the use or disclosure of PHI.
Gramm-Leach-Bliley Modernization Act (GLBA):
GLBA applies to non-bank mortgage lenders, loan brokers, specific financial or investment advisers, tax preparers, real estate
settlement services providers, and debt collectors who are “significantly engaged” in financial activities.
The law is divided into three sections:
1. Rules on the collecting and sharing of private financial information.
2. Data safeguards required to protect private information.
3. A provision prohibiting anyone from obtaining private information under false pretenses.
With Axcient, only authorized users have access to backed up data; and financial institutions have complete access control
over their virtualized servers. In addition, all data is encrypted, whether in transit or at rest in a data center. Axcient’s high
standards for securing private information make it easy for users to comply with GLBA.
Payment Card Industry Data Security Standard (PCI DSS):
Any business that accepts credit card payments or stores, processes, and/or transmits cardholder data must comply with
PCI DSS. Axcient encrypts all of its customers’ data, whether the data is in transit or at rest in our secure SSAE-16 Type
II datacenter. That means the Axcient solution helps businesses comply with the section of PCI DSS that requires proper
protection and encryption of stored cardholder data across open, public networks.
Sarbanes-Oxley Act (SOX):
The SOX Act of 2002 is also known as the Corporate and Auditing Accountability and Responsibility Act and calls on
businesses to meet 11 mandates in order to achieve compliance.
The most significant requirements for Axcient users are Title I, sections 103 and 105; Title III, Section 302; Title IV, Section
404; and Title VIII, Section 802 of the act. Each mandate outlines business compliance for the retention, production,
responsibility, and internal control of business and audit records. Failure to do so can result in fines up to $5 million and/or
20 years in prison.
By providing backup, recovery, and business continuity services with the highest level of uptime and reliability, Axcient
makes it simple for companies to comply with SOX. And with Axcient’s Cloud Continuity feature for instant virtualization of
a business’ systems in the cloud, that business can be assured that in the event of a natural disaster, their files will still be
available from anywhere.
Red Flags Rule:
The Red Flags Rule, which is enforced by the Federal Trade Commission (FTC), came about as a way to protect consumers
from identity theft. Based on sections 114 and 315 of the Fair and Accurate Credit Transactions Act of 2003, the rule man-
dates that businesses create and implement a written Identity Theft Prevention Program to detect “red flags” in their everyday
operations and identify ways to prevent security breaches. The rule applies to financial institutions and creditors, including
(but not limited to) law firms, accounting firms, utility companies, medical practices, and hospitals. Failure to comply with the
federal rule can result in a $3,500 fine per violation and/or a federal lawsuit filed by the U.S. Department of Justice on behalf
of the FTC to comply in the future.
There are four steps that businesses must follow to achieve compliance with the Red Flags Rule.
1.	 Identify “red flags” and possible situations where your data could be vulnerable to identity theft.
2.	 Incorporate business practices to detect red flags.
3.	 Have a detailed appropriate response to prevent identity theft once red flags are detected.
4.	 Keep your plan up to date to reflect changes in risks from identity theft.
Datasheet: Achieving Compliance with Axcient
axcient.com 800.715.2339keysol.com 859.572.9911axcient.com 800.715.2339jelecos.com 402.955.0489
© 2013. Axcient, Inc. All Rights Reserved.
Datasheet: Achieving Compliance with Axcient
For Axcient users, step one will be the most critical to developing a plan. But with Axcient, you can rest assured that your data
is fully protected with government-standard data encryption, accessible only by authorized personnel that you identify, whether
in transit or while in one of the Axcient datacenters.
SELF-REGULATORY ORGANIZATIONS:
In addition to helping achieve compliance with government rules and laws, Axcient also makes it easy for businesses in various
industries to comply with self-regulatory organizations (SROs) that apply to their business. Most SROs adhere to state laws
regarding records retention, but the financial industry sets its own rules and regulations by insisting that those operating in the
brokerage industry maintain membership in one of the following two SROs.
FINRA and MSRB:
The Financial Industry Regulatory Authority (FINRA) and the Municipal Securities Rulemaking Board (MSRB) are private
corporations that act as SROs. Brokerage firms and individual brokers must be members of one of these SROs, which:
• Have regulatory authority over securities firms.
• Write rules for dealers and municipal advisors.
• Inform and educate the investing public.
• Ensure the market operates fairly and with integrity and transparency.
In addition, FINRA oversees business between brokers, dealers, and the investing public; enforces rules and federal securities
laws; monitors broker-dealers; and manages the largest arbitration forum between customer and member firms, as well as
between brokerage firms and their employees.
Axcient provides the security and retention standards users need to comply with MSRB record retention rules and FINRA
rules 4511 to 4515. The MSRB requires businesses to keep records for various durations depending on the types of records
retained. FINRA requires all records to be kept for six years. In both cases, you can set the Axcient platform retention to make
sure your records are protected and always available for any length of time, from anywhere, no matter what happens.
AXCIENT PROVIDES EASY COMPLIANCE AND PEACE OF MIND
No matter what industry rules or regulations you need to follow, Axcient ensures your data, applications, and systems are
securely protected and instantly recoverable from anywhere. With Axcient’s SSAE-16 Type II certified datacenter, FIPS 140-2
standard encryption, reliable technology, and easy-to-use Web interface, achieving regulatory compliance and complete data,
application, and system uptime is easier than ever.
About Jelecos
Jelecos is a consulting and services company that delivers straight-forward, technology solutions aligned tightly with each client’s unique business objectives.
Through a focus on business process and a commitment to relationships, we help you execute core business strategies that speed return on investment.
Jelecos has been honored by INC magazine as one of the fastest growing private companies in the United States. Our philosophy is simple: Business First,
Technology Second.
About Axcient
Axcient is an entirely new type of cloud platform that eliminates data loss, keeps applications up and running, and makes sure that IT infrastructures never
go down. Designed for today’s always-on business, Axcient replaces legacy backup, business continuity, and disaster recovery software and hardware, and
reduces the amount of expensive copy data in an organization by as much as 80%. By mirroring an entire business in the cloud, Axcient makes it simple to
access and restore data from any device, failover IT systems, and virtualize your entire office with a click - all from a single deduplicated copy. Trusted by
thousands of businesses to store and protect more than 10 billion files and applications, Axcient maximizes productivity, reduces cost, and eliminates risk.
axcient.com 800.715.2339jelecos.com 402.955.0489

More Related Content

What's hot

Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XDave James
 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedVISTA InfoSec
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance Raffa Learning Community
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containersAbhishek Sood
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataUlf Mattsson
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryTrend Micro
 
Pci compliance without compensating controls how to take your mainframe out ...
Pci compliance without compensating controls  how to take your mainframe out ...Pci compliance without compensating controls  how to take your mainframe out ...
Pci compliance without compensating controls how to take your mainframe out ...Ulf Mattsson
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Jan Carroza
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
 
Data protection process information
Data protection process informationData protection process information
Data protection process informationyourlegalconsultants
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR complianceDave James
 

What's hot (20)

Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Convince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List XConvince your board: How to prepare your business for List X
Convince your board: How to prepare your business for List X
 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-converted
 
2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance 2018 01-25 Introduction to PCI and HIPAA Compliance
2018 01-25 Introduction to PCI and HIPAA Compliance
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
Managing Information Asset Register
Managing Information Asset RegisterManaging Information Asset Register
Managing Information Asset Register
 
Guide to hipaa compliance for containers
Guide to hipaa compliance for containersGuide to hipaa compliance for containers
Guide to hipaa compliance for containers
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare deliveryAssuring regulatory compliance, ePHI protection, and secure healthcare delivery
Assuring regulatory compliance, ePHI protection, and secure healthcare delivery
 
Pci compliance without compensating controls how to take your mainframe out ...
Pci compliance without compensating controls  how to take your mainframe out ...Pci compliance without compensating controls  how to take your mainframe out ...
Pci compliance without compensating controls how to take your mainframe out ...
 
Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...Personally Identifiable Information – FTC: Identity theft is the most common ...
Personally Identifiable Information – FTC: Identity theft is the most common ...
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Responsible for information
Responsible for informationResponsible for information
Responsible for information
 
Data protection process information
Data protection process informationData protection process information
Data protection process information
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Convince your board - Ten steps to GDPR compliance
Convince your board  - Ten steps to GDPR complianceConvince your board  - Ten steps to GDPR compliance
Convince your board - Ten steps to GDPR compliance
 

Viewers also liked

Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk ManagementNabil Hamdulay
 
Flippad SFI diskussionsfrågor den 25 mars 2014
Flippad SFI  diskussionsfrågor den 25 mars 2014Flippad SFI  diskussionsfrågor den 25 mars 2014
Flippad SFI diskussionsfrågor den 25 mars 2014jossebark
 
Git.mpp.2015 03.s5.va.final
Git.mpp.2015 03.s5.va.finalGit.mpp.2015 03.s5.va.final
Git.mpp.2015 03.s5.va.finalJENNY K. OH
 
La deriva dei continenti
La deriva dei continentiLa deriva dei continenti
La deriva dei continentitestaliscia
 
Git.mpp.2015 02.s4.va.final
Git.mpp.2015 02.s4.va.finalGit.mpp.2015 02.s4.va.final
Git.mpp.2015 02.s4.va.finalJENNY K. OH
 
Cairo travel guide mohammed hamouda
Cairo travel guide mohammed hamoudaCairo travel guide mohammed hamouda
Cairo travel guide mohammed hamoudaMohammed Hamouda
 
Girls in Technology DC - Session #2: Leadership - November 2016
Girls in Technology DC - Session #2: Leadership - November 2016Girls in Technology DC - Session #2: Leadership - November 2016
Girls in Technology DC - Session #2: Leadership - November 2016JENNY K. OH
 
Afrika Yang Resah; Nyanyian Lawino dan Nyanyian Ocol
Afrika Yang Resah; Nyanyian Lawino dan Nyanyian OcolAfrika Yang Resah; Nyanyian Lawino dan Nyanyian Ocol
Afrika Yang Resah; Nyanyian Lawino dan Nyanyian OcolRini Adiani
 
Pràctica 1 de presentacions
Pràctica 1 de presentacionsPràctica 1 de presentacions
Pràctica 1 de presentacionsRobynnatalia
 
Tìm hiểu một số công nghệ web và xây dựng một chương trình newsletter
Tìm hiểu một số công nghệ web và xây dựng một  chương trình newsletterTìm hiểu một số công nghệ web và xây dựng một  chương trình newsletter
Tìm hiểu một số công nghệ web và xây dựng một chương trình newsletterNhzttrwng NW
 
The RPG Dude - Episode 2 - Globalization
The RPG Dude - Episode 2 - GlobalizationThe RPG Dude - Episode 2 - Globalization
The RPG Dude - Episode 2 - Globalizationlooksoftware
 
8 Reasons to get your IBM i Applications Mobile
8 Reasons to get your IBM i Applications Mobile8 Reasons to get your IBM i Applications Mobile
8 Reasons to get your IBM i Applications Mobilelooksoftware
 
Qualifying Exam Presentation
Qualifying Exam PresentationQualifying Exam Presentation
Qualifying Exam PresentationSadegh Asgari
 

Viewers also liked (19)

Operational Risk Management
Operational Risk ManagementOperational Risk Management
Operational Risk Management
 
Flippad SFI diskussionsfrågor den 25 mars 2014
Flippad SFI  diskussionsfrågor den 25 mars 2014Flippad SFI  diskussionsfrågor den 25 mars 2014
Flippad SFI diskussionsfrågor den 25 mars 2014
 
Food security
Food securityFood security
Food security
 
Model oranisms used in genetics
Model oranisms used in geneticsModel oranisms used in genetics
Model oranisms used in genetics
 
Git.mpp.2015 03.s5.va.final
Git.mpp.2015 03.s5.va.finalGit.mpp.2015 03.s5.va.final
Git.mpp.2015 03.s5.va.final
 
La deriva dei continenti
La deriva dei continentiLa deriva dei continenti
La deriva dei continenti
 
Git.mpp.2015 02.s4.va.final
Git.mpp.2015 02.s4.va.finalGit.mpp.2015 02.s4.va.final
Git.mpp.2015 02.s4.va.final
 
Ldership ict
Ldership ictLdership ict
Ldership ict
 
Cairo travel guide mohammed hamouda
Cairo travel guide mohammed hamoudaCairo travel guide mohammed hamouda
Cairo travel guide mohammed hamouda
 
Girls in Technology DC - Session #2: Leadership - November 2016
Girls in Technology DC - Session #2: Leadership - November 2016Girls in Technology DC - Session #2: Leadership - November 2016
Girls in Technology DC - Session #2: Leadership - November 2016
 
Afrika Yang Resah; Nyanyian Lawino dan Nyanyian Ocol
Afrika Yang Resah; Nyanyian Lawino dan Nyanyian OcolAfrika Yang Resah; Nyanyian Lawino dan Nyanyian Ocol
Afrika Yang Resah; Nyanyian Lawino dan Nyanyian Ocol
 
Pràctica 1 de presentacions
Pràctica 1 de presentacionsPràctica 1 de presentacions
Pràctica 1 de presentacions
 
Tìm hiểu một số công nghệ web và xây dựng một chương trình newsletter
Tìm hiểu một số công nghệ web và xây dựng một  chương trình newsletterTìm hiểu một số công nghệ web và xây dựng một  chương trình newsletter
Tìm hiểu một số công nghệ web và xây dựng một chương trình newsletter
 
The RPG Dude - Episode 2 - Globalization
The RPG Dude - Episode 2 - GlobalizationThe RPG Dude - Episode 2 - Globalization
The RPG Dude - Episode 2 - Globalization
 
Competition act
Competition actCompetition act
Competition act
 
my questionnaire
my questionnairemy questionnaire
my questionnaire
 
8 Reasons to get your IBM i Applications Mobile
8 Reasons to get your IBM i Applications Mobile8 Reasons to get your IBM i Applications Mobile
8 Reasons to get your IBM i Applications Mobile
 
Evoluzione
Evoluzione Evoluzione
Evoluzione
 
Qualifying Exam Presentation
Qualifying Exam PresentationQualifying Exam Presentation
Qualifying Exam Presentation
 

Similar to Axcient Datasheet Explains Compliance Solutions

Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer PlatformShanmugavel Sankaran
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deckRichard (Dick) Kaufman
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxlorainedeserre
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docxjesusamckone
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersRobert Ambrogi
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelinesamburyj3c9
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010madamseane
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTCompliancy Group
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Raleigh ISSA
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
Infographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-StandardsInfographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-StandardsClint Walker
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...PECB
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdfControlCase
 

Similar to Axcient Datasheet Explains Compliance Solutions (20)

Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
The Virtual Security Officer Platform
The Virtual Security Officer PlatformThe Virtual Security Officer Platform
The Virtual Security Officer Platform
 
2016 01-05 csr css non-confidential slide deck
2016 01-05 csr  css non-confidential slide deck2016 01-05 csr  css non-confidential slide deck
2016 01-05 csr css non-confidential slide deck
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx27featurearticle© 2015 Wiley P.docx
27featurearticle© 2015 Wiley P.docx
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010Mass Information Security Requirements January 2010
Mass Information Security Requirements January 2010
 
The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Infographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-StandardsInfographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-Standards
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
ISO/IEC 27001 vs. CCPA and NYC Shield Act: What Are the Similarities and Diff...
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Axcient Datasheet Explains Compliance Solutions

  • 1. Datasheet: Achieving Compliance with Axcient © 2013. Axcient, Inc. All Rights Reserved. With such high customer expectations and demands, businesses today cannot afford to dedicate a significant amount of time ensuring the dependability and industry compliance of their data backup solutions. At Axcient, we understand the importance of having your business files, applications, and systems securely backed up and constantly available. That’s why Axcient makes achieving compliance as simple as possible with our all-in-one data backup, business continuity, and disaster recovery solution, built to provide you with the ultimate reliability, usability, and peace of mind. WE MAKE IT EASY FOR YOU Laws and regulations are rarely straightforward, but Axcient alleviates much of your industry compliance burden by providing security measures that meet or exceed most standards. For example: 1. Axcient datacenters are SSAE-16 Type II certified and located on opposite North American coasts. 2. Our HP-based hardware meets the highest industry security standards for reliability and performance. 3. All data is encrypted – both in transit and while at rest – using AES-128 (Advanced Encryption Standard) with a unique encryption key that meets the government’s FIPS 140-2 standard for top-secret documents. 4. Datacenter access is strictly limited and enforced by the use of CCTV, biometric technology, and 24/7 personnel. 5. The original version of data and applications, once backed-up, can only be accessed by authorized personnel that you identify. TRUST IN AXCIENT While other backup, business continuity, and disaster recovery solutions are cobbled together by multiple vendors – making them more time consuming to manage and more likely to corrupt your data – Axcient has built its entire solution in-house, from the ground up, for the greatest simplicity and most reliable performance. Axcient’s patent-pending technology includes: • Data Backup and Restore: Your data is stored on an onsite appliance for fast backups and restores, and also securely replicated offsite. Reverse incremental backups mean the latest versions of your backups are always on top and easy to find. Brick level restores offer the option to recover specific files within your server when needed. • Business Continuity & Cloud Continuity: In the event of a server outage, you can run servers on the onsite ap- pliance with a single click until the new hardware is ready. If your entire building or infrastructure is destroyed, you can quickly virtualize your servers and work off of the secure Axcient cloud. • Disaster Recovery: Your data is protected in the event of a fire, theft, sabotage, hardware failure, or natural disaster in our secure, offsite datacenter. Use our Cloud Continuity service to keep all of your data and applications available and up and running in the cloud. Then, use our Bare Metal Restore (BMR) capabilities to bring your continually backed up data back to your repaired or replaced servers. That means no downtime, no loss of productivity, and no financial loss due to downtime. AXCIENT HELPS BUSINESSES BECOME INDUSTRY COMPLIANT The following lists some of the specific regulations that Axcient end-users must frequently comply with and how Axcient helps end-users meet each of these compliance standards: HIPAA: The Health Insurance Portability and Accountability Act (HIPAA) covers a wide range of topics, including specific standards for securing the privacy of healthcare-related data. Two parts of HIPAA in particular require healthcare providers to maintain standards for data integrity, data access, and audit controls for Protected Health Information (PHI). 1. The HIPAA Privacy Rule: Under the law, organizations must securely and privately store PHI to guard against reasonably anticipated threats and hazards that could damage the data both in transit and during storage. 2. The HIPAA Security Rule: The rule underlines the administrative procedures, physical safeguards, and technical safeguards required to protect access to PHI. Achieving Compliance with Axcient axcient.com 800.715.2339jelecos.com 402.955.0489
  • 2. © 2013. Axcient, Inc. All Rights Reserved. With Axcient, healthcare providers can easily meet or exceed HIPAA requirements because the Axcient solution encrypts data every step of the way and does not require or involve the use or disclosure of PHI. Gramm-Leach-Bliley Modernization Act (GLBA): GLBA applies to non-bank mortgage lenders, loan brokers, specific financial or investment advisers, tax preparers, real estate settlement services providers, and debt collectors who are “significantly engaged” in financial activities. The law is divided into three sections: 1. Rules on the collecting and sharing of private financial information. 2. Data safeguards required to protect private information. 3. A provision prohibiting anyone from obtaining private information under false pretenses. With Axcient, only authorized users have access to backed up data; and financial institutions have complete access control over their virtualized servers. In addition, all data is encrypted, whether in transit or at rest in a data center. Axcient’s high standards for securing private information make it easy for users to comply with GLBA. Payment Card Industry Data Security Standard (PCI DSS): Any business that accepts credit card payments or stores, processes, and/or transmits cardholder data must comply with PCI DSS. Axcient encrypts all of its customers’ data, whether the data is in transit or at rest in our secure SSAE-16 Type II datacenter. That means the Axcient solution helps businesses comply with the section of PCI DSS that requires proper protection and encryption of stored cardholder data across open, public networks. Sarbanes-Oxley Act (SOX): The SOX Act of 2002 is also known as the Corporate and Auditing Accountability and Responsibility Act and calls on businesses to meet 11 mandates in order to achieve compliance. The most significant requirements for Axcient users are Title I, sections 103 and 105; Title III, Section 302; Title IV, Section 404; and Title VIII, Section 802 of the act. Each mandate outlines business compliance for the retention, production, responsibility, and internal control of business and audit records. Failure to do so can result in fines up to $5 million and/or 20 years in prison. By providing backup, recovery, and business continuity services with the highest level of uptime and reliability, Axcient makes it simple for companies to comply with SOX. And with Axcient’s Cloud Continuity feature for instant virtualization of a business’ systems in the cloud, that business can be assured that in the event of a natural disaster, their files will still be available from anywhere. Red Flags Rule: The Red Flags Rule, which is enforced by the Federal Trade Commission (FTC), came about as a way to protect consumers from identity theft. Based on sections 114 and 315 of the Fair and Accurate Credit Transactions Act of 2003, the rule man- dates that businesses create and implement a written Identity Theft Prevention Program to detect “red flags” in their everyday operations and identify ways to prevent security breaches. The rule applies to financial institutions and creditors, including (but not limited to) law firms, accounting firms, utility companies, medical practices, and hospitals. Failure to comply with the federal rule can result in a $3,500 fine per violation and/or a federal lawsuit filed by the U.S. Department of Justice on behalf of the FTC to comply in the future. There are four steps that businesses must follow to achieve compliance with the Red Flags Rule. 1. Identify “red flags” and possible situations where your data could be vulnerable to identity theft. 2. Incorporate business practices to detect red flags. 3. Have a detailed appropriate response to prevent identity theft once red flags are detected. 4. Keep your plan up to date to reflect changes in risks from identity theft. Datasheet: Achieving Compliance with Axcient axcient.com 800.715.2339keysol.com 859.572.9911axcient.com 800.715.2339jelecos.com 402.955.0489
  • 3. © 2013. Axcient, Inc. All Rights Reserved. Datasheet: Achieving Compliance with Axcient For Axcient users, step one will be the most critical to developing a plan. But with Axcient, you can rest assured that your data is fully protected with government-standard data encryption, accessible only by authorized personnel that you identify, whether in transit or while in one of the Axcient datacenters. SELF-REGULATORY ORGANIZATIONS: In addition to helping achieve compliance with government rules and laws, Axcient also makes it easy for businesses in various industries to comply with self-regulatory organizations (SROs) that apply to their business. Most SROs adhere to state laws regarding records retention, but the financial industry sets its own rules and regulations by insisting that those operating in the brokerage industry maintain membership in one of the following two SROs. FINRA and MSRB: The Financial Industry Regulatory Authority (FINRA) and the Municipal Securities Rulemaking Board (MSRB) are private corporations that act as SROs. Brokerage firms and individual brokers must be members of one of these SROs, which: • Have regulatory authority over securities firms. • Write rules for dealers and municipal advisors. • Inform and educate the investing public. • Ensure the market operates fairly and with integrity and transparency. In addition, FINRA oversees business between brokers, dealers, and the investing public; enforces rules and federal securities laws; monitors broker-dealers; and manages the largest arbitration forum between customer and member firms, as well as between brokerage firms and their employees. Axcient provides the security and retention standards users need to comply with MSRB record retention rules and FINRA rules 4511 to 4515. The MSRB requires businesses to keep records for various durations depending on the types of records retained. FINRA requires all records to be kept for six years. In both cases, you can set the Axcient platform retention to make sure your records are protected and always available for any length of time, from anywhere, no matter what happens. AXCIENT PROVIDES EASY COMPLIANCE AND PEACE OF MIND No matter what industry rules or regulations you need to follow, Axcient ensures your data, applications, and systems are securely protected and instantly recoverable from anywhere. With Axcient’s SSAE-16 Type II certified datacenter, FIPS 140-2 standard encryption, reliable technology, and easy-to-use Web interface, achieving regulatory compliance and complete data, application, and system uptime is easier than ever. About Jelecos Jelecos is a consulting and services company that delivers straight-forward, technology solutions aligned tightly with each client’s unique business objectives. Through a focus on business process and a commitment to relationships, we help you execute core business strategies that speed return on investment. Jelecos has been honored by INC magazine as one of the fastest growing private companies in the United States. Our philosophy is simple: Business First, Technology Second. About Axcient Axcient is an entirely new type of cloud platform that eliminates data loss, keeps applications up and running, and makes sure that IT infrastructures never go down. Designed for today’s always-on business, Axcient replaces legacy backup, business continuity, and disaster recovery software and hardware, and reduces the amount of expensive copy data in an organization by as much as 80%. By mirroring an entire business in the cloud, Axcient makes it simple to access and restore data from any device, failover IT systems, and virtualize your entire office with a click - all from a single deduplicated copy. Trusted by thousands of businesses to store and protect more than 10 billion files and applications, Axcient maximizes productivity, reduces cost, and eliminates risk. axcient.com 800.715.2339jelecos.com 402.955.0489