Security is our Core Competency

Cloud providers are under increasing pressure to provide adequate levels of information security and data protection. To become a trusted business partner for customers, service providers must offer levels of data protection and security management that meet and then exceed customer expectations.

Learn more about Artisan Infrastructure security, compliance and privacy policies.

Our Commitment to Security

  • ISO/IEC 27001:2013 information security

    Our program is aligned with international standards and tailored for our service provider partners.

  • Annual SOC2 type II audits

    Providing assurance as to the suitability of the design and operating effectiveness of our controls.

  • Regulatory compliance

    We enable our partners to achieve compliance with various regulatory requirements including HIPPA and PCI.

  • Full-time CISO

    We employ a full-time CISO with experience in creating and leading security organizations for service providers.

built in cloud security

DDoS Mitigation Services

Industry reports show distributed denial of service (“DDoS”) attacks have grown an astounding 132% compared to last year.

With this persistent threat to cyber-security growing every day, we have taken the responsibility to include DDoS mitigation services with all of our clouds - enabling you to focus on your business, not your cloud security. Cornerstone™ DDoS Mitigation Service is capable of defeating the world’s largest and most complex attacks, offering scale, speed, and success in providing a defense for our partners.

Philosophy Overview

Security at Artisan is built in, not bolted on. Bolting on security as an afterthought has left previous generations of technology vulnerable to malware attacks, advanced persistent threats and other breach tactics. Our philosophy is that security is an integral part of our business and that only by providing a secure platform can we enable not only our success but that of our partners.

Security is a Shared Responsibility

When a partner moves infrastructure and data to our platform, the responsibility for security becomes shared. Artisan is responsible for security of the underlying infrastructure and the partner is responsible for the security of their environments Maintaining a trusted relationship is paramount to our joint success.

Accountability and Integrity

Artisan demonstrates an ongoing commitment to information security through the establishment and operation of an information security and compliance program headed by a full-time Chief Information Security Officer (CISO) that reports directly to the CEO.

Security governance, risk management and compliance.

With Architect IT managers can define business continuity and availability service level targets for each business service and immediately identify non-compliant components of the infrastructure. Architect provides four service level tiers that users can customize to define their own targets, then assign each business service to the appropriate tier. Architect automatically reports on any gaps or misconfigurations of protection infrastructure. This lets IT know in advance if there are any gaps in the organization’s protection strategy that put the business at risk.

Security Best-Practice Checklist:

  • Data center access limited to Artisan Craftsmen only

  • Security cameras monitoring all locations

  • Unmarked facilities to help maintain low profile

  • System installation using hardened, patched OS

  • Data protection with managed backup solutions

  • Distributed DoS mitigation services based on our proprietary Cornerstone services

  • Access to confidential information restricted to authorized personnel only

  • Fully documented change-management procedures

  • Best practices used in the random generation of passwords

  • Secure media handling and destruction procedures for all data

  • Biometric scanning for controlled access

  • 24x7x365 onsite staff

  • Physical security audited by an independent firm

  • Dedicated firewall and VPN services

  • All employees trained on documented information security and privacy procedures

  • Systems access logged and tracked for auditing purposes

  • Independent audited disaster recovery and business continuity plans backed up by our market leading Neverfail IT Continuity Management software

  • All passwords encrypted during transmission and while in storage

  • Security professional available to provide guidance in developing security processes for compliance programs

+ Philosophy

Philosophy Overview

Security at Artisan is built in, not bolted on. Bolting on security as an afterthought has left previous generations of technology vulnerable to malware attacks, advanced persistent threats and other breach tactics. Our philosophy is that security is an integral part of our business and that only by providing a secure platform can we enable not only our success but that of our partners.

Security is a Shared Responsibility

When a partner moves infrastructure and data to our platform, the responsibility for security becomes shared. Artisan is responsible for security of the underlying infrastructure and the partner is responsible for the security of their environments Maintaining a trusted relationship is paramount to our joint success.

Accountability and Integrity

Artisan demonstrates an ongoing commitment to information security through the establishment and operation of an information security and compliance program headed by a full-time Chief Information Security Officer (CISO) that reports directly to the CEO.

Security governance, risk management and compliance.

With Architect IT managers can define business continuity and availability service level targets for each business service and immediately identify non-compliant components of the infrastructure. Architect provides four service level tiers that users can customize to define their own targets, then assign each business service to the appropriate tier. Architect automatically reports on any gaps or misconfigurations of protection infrastructure. This lets IT know in advance if there are any gaps in the organization’s protection strategy that put the business at risk.

+ Security At-a-Glance

Security Best-Practice Checklist:

  • Data center access limited to Artisan Craftsmen only

  • Security cameras monitoring all locations

  • Unmarked facilities to help maintain low profile

  • System installation using hardened, patched OS

  • Data protection with managed backup solutions

  • Distributed DoS mitigation services based on our proprietary Cornerstone services

  • Access to confidential information restricted to authorized personnel only

  • Fully documented change-management procedures

  • Best practices used in the random generation of passwords

  • Secure media handling and destruction procedures for all data

  • Biometric scanning for controlled access

  • 24x7x365 onsite staff

  • Physical security audited by an independent firm

  • Dedicated firewall and VPN services

  • All employees trained on documented information security and privacy procedures

  • Systems access logged and tracked for auditing purposes

  • Independent audited disaster recovery and business continuity plans backed up by our market leading Neverfail IT Continuity Management software

  • All passwords encrypted during transmission and while in storage

  • Security professional available to provide guidance in developing security processes for compliance programs

Cloud Security Shouldn’t Be An Afterthought

Protect your solutions with world-class security, so you can rest easier at night