1. |
Understanding High Availability vs. Disaster Recovery... Whether you use the cloud or dedicated servers, you should always make sure you have a plan for your configuration in the event that something goes wrong. People use the phrase Disaster Recovery (DR) to mean different things, and they will often ask what they can do to make sure that they have a strong DR plan. These clients requesting a DR strategy reality are looking for a High Availability (HA) solution. This is why it is important to unde...
- Site Map
- Everyone: All Users
- 2/16/2010
- Relevance: 270
-
-
12/31/9999 11:59:59 PM
-
Cloud, High Availability, Fail Over, Disaster Recovery, Mission Critical
-
-
-
-
-
-
-
-
8/29/2020 6:59:37 PM
-
-
|
2. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 102
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:19 PM
-
-
|
3. |
Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The Cloud Security Alliance Consensus Assessments Initiative (CAI) was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments. We are focused on providing industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings, providing security control transparency. This effort by design is integrated with and will support ...
- Site Map
- Everyone: All Users
- 6/5/2017
- Relevance: 58
-
-
12/31/9999 11:59:59 PM
-
CMS CAIQ Compliance, CAIQ Portal, ECM CAIQ
-
-
-
-
-
-
-
-
9/19/2018 5:58:02 AM
-
-
|
4. |
The Federal Information Security Management Act (FISMA) requires federal agencies to implement and support standardized IT security controls. These controls, defined by the National Institute of Standards and Technology (NIST), allow agencies to safely and confidently outsource critical applications to FISMA-compliant clouds, managed hosting environments and SaaS providers. Designed to Address Strict FISMA Standards More than half of all federal cabinet-level agencies — including Veterans Affairs, the De...
- Site Map
- Everyone: All Users
- 9/13/2017
- Relevance: 33
-
-
12/31/9999 11:59:59 PM
-
Fedramp, FISMA, Federal Government Hosting, 21st Century Digital Experience, Managed Services, FedRAMP Compliance, FISMA compliant, US Government
-
-
-
-
-
-
-
-
12/20/2023 3:53:17 PM
-
-
|
5. |
- Security Policies
- General
- Everyone: All Users
- 10/26/2022
- Relevance: 20
-
-
12/31/9999 11:59:59 PM
-
Implement, Implementation, First Time, Installation, Setting UP, Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, implement, CP, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:21 PM
-
-
|
6. |
The life sciences community has always been more conservative when it comes to the adoption of new technologies, and cloud-based systems are no exception. This cautious approach to shiny new technology objects is more than appropriate given the high stakes nature of the good work these companies perform. Mitigating risks and avoiding new ones is top of mind for pharmaceutical IT and quality professionals. Now that cloud-computing models are well accepted across many industries with proven security models...
- Site Map
- Everyone: All Users
- 6/4/2017
- Relevance: 12
-
-
12/31/9999 11:59:59 PM
-
FDA, GMA, Validation, Security
-
-
-
-
-
-
-
-
7/20/2020 1:33:18 PM
-
-
|
7. |
Below are the security measures and security procedures Oxcyon follows to ensure the safekeeping of original documents when offering managed hosting services. If Centralpoint is set up on-site or in a cloud environment, the client would need to implement and oversee these same measures. First, an overview on what original or authoritative Documents are in simple terms is like a system or set of rules to manage important papers or digital files in an organized way. Imagine you have a big library, an...
- Site Map
- Everyone: All Users
- 9/12/2012
- Relevance: 11
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/15/2023 5:06:26 PM
-
-
|
8. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 9
-
-
12/31/9999 11:59:59 PM
-
SOC 2 Report 2017, Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:03:55 PM
-
-
|