COMPLIANCE SOLUTIONS

COMPLIANCE

It takes tenacity to keep a network safe, secure and compliant

Depending on the nature and purpose of your business and the technologies employed to manage that business, maintaining compliance with a host of ever-changing legal requirements and specifications is a true minefield of potential business threats.

A change in a router. The opening of ports in a firewall. Installing a new application. A change in ACL. A failure to upgrade software or firmware. Seemingly simple activities may have a cascading effect on both your security and your compliance requirements.

Technology is amazing, but left on its own, it can run out of control. Our experts make the difference. People with the knowledge and expertise to know exactly what your business needs to maintain its compliance. People committed to doing everything it takes to keep your network running no matter what. It takes tenacity to stay on top of technology. It takes Global IP Networks.

100% committed to engineering custom solutions specifically for your business.

Let’s talk specifics

    w

    100% committed to customer success, and it shows

    Our new network went up without a hitch. Their staff is timely, customer-focused and most of all, technically sound.

    ANITA SCHOENFELD, PRESIDENT ANITA SCHOENFELD, PRESIDENT OOSI

    The executive team is constantly checking in to make sure that they’re enabling our business to succeed.

    ARNAV KEJRIWAL, DIRECTOR ARNAV KEJRIWAL, DIRECTOR MET INTERNATIONAL

    After years of hosting at Amazon and IBM, we moved our systems to Global IP. Their level of service is far superior.

    CARLOS OLIVIERA, PRESIDENT CARLOS OLIVIERA, PRESIDENT LUCENT UNIVERSITY

    I really appreciate when good engineers do their homework ahead of time. Global IP has done outstanding work for us!

    DAVE PERKOWSKI, GM DAVE PERKOWSKI, GM ALL AXIS ROBOTICS

    Their expertise makes the difference. All their NOC staff members are very friendly, and they are always available to help.

    DICK KAI, OWNER DICK KAI, OWNER VOKO

    The security and stability for communication, video meetings and file storage that they provide exceeded our every need!

    DR. BRENT RAY, DIRECTOR DR. BRENT RAY, DIRECTOR SOUTHWESTERN BAPTIST THEOLOGICAL SEMINARY

    As the Dominican Republic’s largest hosting provider, our data center is vital. Global IP has been our right hand.

    JOMAN SIERRA, CEO JOMAN SIERRA, CEO DOMINET

    I used to be worried about our uptime, but not anymore after moving to Global IP Networks.

    JOSE BRAVO, CEO JOSE BRAVO, CEO COLUMBIA HOSTING

    We migrated our servers to Global IP Networks in search of quality and reliable service. We couldn’t be more pleased!

    MARIO HERNANDEZ, CEO MARIO HERNANDEZ, CEO PROSYGA

    They have been outstanding. The timely and personal customer service is excellent and the overall performance, flawless.

    HAMPTON KEATHLEY IV, TECHNICAL DIRECTOR HAMPTON KEATHLEY IV, TECHNICAL DIRECTOR BIBLE.ORG

    They hold to their values of excellence, and it shows in the attention to detail, service responsiveness and integrity.

    GREG WYMAN, PRESIDENT GREG WYMAN, PRESIDENT ETERNAL INTERACTIVE

    Policies and processes to protect your business

    When it comes to security, integrity, availability, control, procedures and privacy, we are audited by third-party auditors to validate our best practices and declare our compliance. As a result, we have helped many clients to bridge the gap in their compliance.
    Global IP Networks are audited and declared compliant in accordance with:

    Industry Served: Service Providers, Software, IT Related
    Service Organizations

    Compliance Since: 2009

    Industry Served: Banking, Financial, Credit Card Processing and Clearing House

    Compliance Since: 2012

    Industry Served: Healthcare and Insurance

    Compliance Since: 2015

    SSAE 16 SOC 2 TYPE II
    The SSAE-16 SOC-2 Type 2 report on controls is used to assess compliance and identify critical oversights for evaluating the Security, Availability, Processing Integrity and Confidentiality (Privacy) at a service organization.
    A variety of users and stakeholders—from customers to business partners to directors—use these reports to evaluate and understand internal controls at a service organization. Reports are conducted based on criteria outlined in the AICPA Guide: Reporting on Controls at Service Organizations Relevant to Security, Availability, Processing Integrity, Confidentiality, or Privacy, and can be used to inform affiliates with a broad understanding of internal operations such as:

    • Oversight of the organization
    • Vendor management program
    • Internal corporate governance and risk management processes
    • Regulatory oversight

    Global IP Networks has been audited for both Type 1 (suitability of the design of controls) and Type 2 (the operating effectiveness of those controls) and declared compliant for SAS-70 and SOC-2 audit since 2009. Book a tour of our Dallas or Plano, TX facilities to get an up-close look at the same equipment and infrastructure our hundreds of other clients rely on each and every day.

    wSchedule a tour

    PCI – Payment Card Industry
    Data security standards matter—no matter the size of your operation. If you accept credit card payments, you must protect cardholder data.
    In 2005, the Payment Card Industry Council created the Payment Card Industry Data Security Standard—a requirement of all five major credit companies—including American Express, Discover Financial Services, JCB International, Mastercard Worldwide and Visa.
    The more transactions a merchant completes a year, the more checks and audits are needed to remain in compliance. When transmitting credit card data merchants and stores must, at minimum, implement the following:

    • Employ Approved Scanning Vendors (ASVs) to assess website and server vulnerability
    • Perform security audits
    • Complete self-assessment questionnaires (SAQs)

    PCI standards fall into six overarching categories with a total of 12 PCI DDS requirements to remain compliant.

    Build and Maintain a Secure Network
    • Requirement 1 – Install and maintain a firewall.
    • Requirement 2- – Do not use vendor-supplied defaults for system passwords or other security parameters.
    Protect Cardholder Data
    • Requirement 3 – Protect stored cardholder data.
    • Requirement 4- – Encrypt transmission or cardholder data across public networks.
    Maintain a Vulnerability Management Program
    • Requirement 5 – Protect all systems against malware and regularly update anti-virus programs.
    • Requirement 6 – Develop and maintain secure systems and applications.
    Implement Strong Access Control Measures
    • Requirement 7 – Restrict access to cardholder data by business need-to know.
    • Requirement 8 – Identify and authenticate access to system components.
    • Requirement 9 – Restrict physical access to cardholder data.
    Regularly Test and Monitor Networks
    • Requirement 10 – Track and monitor all access to network resources and card holder data.
    • Requirement 11 – Regularly test security systems and processes.
    Maintain an Information Security Policy
    • Requirement 12 – Maintain an information security policy.

    Global IP Networks is PCI audited and declared compliant since 2012. To take a tour of our Plano or Dallas facilities, simply book an appointment. The proof will be found in the unparalleled quality of our protective equipment and infrastructure.

    wSchedule a tour

    HIPAA – HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT

    Covered entities (CEs) and business associates (BAs) with access to patient information such as treatments or payments are mandated to remain compliant with HIPAA, the Health Insurance Portability and Accountability Act of 1996.

    Both the HIPAA Privacy Rule and HIPAA Security Rule outline national standards to safeguard sensitive patient data and protected health information (PHI). Where the privacy rule applies to the storing and sharing of medical records, the security rule more specifically outlines standards for handling electronic protected health information (ePHI).

    HIPAA-compliant hosting providers and HIPAA-compliant data centers must maintain certain administrative, physical and technical safeguards to keep records and personal health information confidential, error-free and protected. Compliance standards set forth by the U.S. Department of Health and Human Services outline certain physical and technical protections, which include:

    Audit Procedures.

    Covers areas including security breaches, and hardware and software tracking procedures.

    Physical Security.

    Includes expectations for the use of personal health information, secure access to records, and policies for protection and disposal of information. At our Dallas and Plano facilities, we utilize unparalleled quality to ensure all standards are met.

    Technical Security.

    Outlines measures like restrictive passwords and multi-level system protections.

    Network and Transmission Security.

    Outlines restriction of network access and transmission of data across a HIPAA-compliant network.

    Global IP Networks is HIPAA audited and declared compliant since 2015. If you need help with HIPAA compliance, you should talk with our experts.

    w Contact us

    orange_logoWe keep your net working