logo

Select Sidearea

Populate the sidearea with useful widgets. It’s simple to add images, categories, latest post, social media icon links, tag clouds, and more.
hello@youremail.com
+1234567890
We take pride in pairing great service with great support
We are built to help you scale without sacrificing industry leading 1-1 support in the process.
Infrastructure
Not all clouds are created equal
A cloud’s performance relies as much on its provider’s experience as it does on its technical assets.
Over the years, our architects and engineers have accumulated tremendous wisdom as they’ve continuously evolved our cloud to anticipate user needs and surpass our increasingly stringent internal benchmarks.
bluephoto_103168_20170630
Enterprise-grade cloud
Cloud Clarity’s technology stands with other technology leaders, our experience is virtually unparalleled.
np_performance_426104_6FB8E6

Performance

Any business that relies on the cloud knows that speed matters. That’s why we’ve engineered our solutions to meet your performance needs. Our architects and engineers have designed our cloud services to ensure you are operating in a way that is meaningful to your business’s needs.

np_data-center_968730_6FB8E6

Physical Environment

Cloud Clarity’s data center is certified by the Uptime Institute to be a Tier III Gold design with Tier IV capabilities operating as a 24/7 operation. Your systems and data is in an SSAE 16 Type II compliant facility, contact our team to get a copy of this report yourself.

np_access-control_995819_6FB8E6

Security

The Security in our data center requires three tokens, an access card, a retinal scanner, and a pin number to gain access to the data center floor. Our facility and perimeter are under constant video surveillance and monitored by on-premise security guards around the clock.

np_internet-server_528058_6FB8E6

Internet Access

Internet access to our systems is handled through carrier neutral BGP routing across multiple tier 1 internet providers, using multiple redundant fiber connections, entering in different parts of the building. All of our systems are connected to the internet by completely redundant connections.

np_fire-extinguisher_593674_6FB8E6

Fire Safely

Our systems are protected by VESDA (Very Early Smoke Detection Apparatus) dry fire suppression systems. This means your systems and data are protected from even the worst disasters.

np_rules_197152_6FB8E6

Auditing Process

We undergo an SSAE16 Type II auditing process in our data centers to ensure our physical access requirements are met. Some of our software ensures that you are protected under your HIPAA, GLBA, SOC 1&2, and PCI-DSS regulations. Connect with us to learn more.

np_cool-temperature_1849791_6FB8E6

Cooling

Cooling is handled by 30-ton CRAC units that are configured in an N+1 configuration, while multiple Xcel Energy power substations provide power. Generators are are also configured in an N+1 configuration, and our UPS system that handle both primary and backup power systems again are configured in an N+1 configuration.

np_audit_1110080_6FB8E6

Regulations

HITECH

FedRAMP

PCI-DSS

HIPAA

GLBA

FIPS 140-2

FISMA

Reliability
Cloud Clarity offers a 99.999% uptime SLA for all its services.
Cloud Clarity isn't like other cloud providers that leave you hanging until they get to your position in a queue. Our team specializes in making sure you're taken care of, and our service agreements make sure you know what to expect. You know us, and you know you can count on us.
On top of that our team uses state of the art technologies to ensure our system are up and available for you. Historically speaking, our systems have been up and operating at or above 99.999% of the time and we plan on continuing to accomplish that.
Compliance

HIPAA

Relevant section/topic

Compliance Requirements

How We Can Help

HIPAA Security Rule (45 CFR Part 160, 164)

Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
  • Email encryption designed to meet HIPAA standards.
  • Predefined encryption policies for PHI, identity and financial data.
  • Intermedia offers a HIPAA-compliant Business Associate Agreement for our resellers and customers, containing commitments by Intermedia to comply with requirements under HIPAA to facilitate our resellers’ and customers’ compliance with that law.

SARBANES-OXLEY

Relevant section/topic

Compliance Requirements

How We Can Help

Protection of Security Technology

Make security-related technology resistant to tampering, and do not disclose security documentation unnecessarily.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Secure key storage and distribution.
  • Role-based permissions for accessing archive

Cryptographic Key Management

Determine that policies and procedures are in place to ensure the protection of cryptographic keys against modification and unauthorized disclosure.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Annual SOC 2 audits.

Exchange of Sensitive Data

Exchange sensitive transaction data only over a trusted path or medium with controls to provide authenticity of content, proof of submission, proof of receipt, and non-repudiation of origin.
  • Standards-based technologies such as Public Key Infrastructure (PKI), S/MIME and X.509 certificates are used to establish confidentiality, message integrity and user authentication.

Security Requirements for Data Management

Define and implement policies and procedures to identify and apply security requirements applicable to the receipt, processing, storage and output of data to meet business objectives, organizational security policy, and regulatory requirements.
  • Annual SOC 2 audits.

MISC STATUTES

Relevant section/topic

Compliance Requirements

How We Can Help

The Financial Privacy Rule

Financial institutions must provide each consumer with a privacy notice, explaining where the info is shared, how it is used and how it is protected, at the time the consumer relationship is established and annually thereafter.
  • World-class data center infrastructure with annual SOC 2 audits.
  • AES-256 bit encryption.

The Safeguards Rule

Financial institutions must design, implement, and maintain an information security plan to protect customer information; it also applies to credit reporting agencies, appraisers and mortgage brokers receiving info from financial institutions.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Complies with PCI-DSS standards.
  • Data encrypted at all times (in transit & at rest).
  • 100% file capture and backup.

GRAMM-LEACH-BLILEY ACT

Relevant section/topic

Compliance Requirements

How We Can Help

The Financial Privacy Rule

Financial institutions must provide each consumer with a privacy notice, explaining where the info is shared, how it is used and how it is protected, at the time the consumer relationship is established and annually thereafter.
  • World-class datacenter infrastructure with annual SOC 2 audits.
  • AES-256 bit encryption.

The Safeguards Rule

Financial institutions must design, implement, and maintain an information security plan to protect customer information; it also applies to credit reporting agencies, appraisers and mortgage brokers receiving info from financial institutions.
  • Data encryption in transit and at rest (AES- 256 bit).
  • Complies with PCI-DSS standards.
  • Data encrypted at all times (in transit & at rest).
  • 100% file capture and backup.

NASD

Relevant section/topic

Compliance Requirements

How We Can Help

Rule 2860 (b)(17)

Members shall maintain and keep current a separate central log, index or other files for all options-related complaints, through which these complaints can easily be identified and retrieved. Background and financial information of customers shall be maintained at specific locations, including the principal supervisory office (or elsewhere, as long as the documents are “readily accessible and promptly retrievable”)
  • Full-text indexing & search.
  • Archived data access from any web browser, desktop, and mobile device.

SEC

Relevant section/topic

Compliance Requirements

How We Can Help

Rule 17a-3

Most members of a national securities exchange, as well as brokers and dealers, must keep current a variety of books and records that relate to their business.
  • 24/7 offline data access and search with role-based permissions for accessing archive.

Rule 17a-4 & NASD 3010

Securities dealers must implement specific, enforceable retention procedures, which include the following:

  • Messages must be stored in duplicate.
  • Data must be verified automatically for quality and accuracy.
  • Messages must be date/time-stamped and serialized.
  • A searchable index of all data must be maintained.
  • Messages and indexes must be easily retrievable.
  • Stored data is backed up and stored on fully redundant platform with 99.999% uptime SLA.
  • Full-text indexing and search capability.
  • All stored files and corresponding file activity are time-stamped, and auditable via Audit Log and Admin File Management.
  • Configurable retention policies.

Investment Advisers Act of 1940

Hedge fund managers with assets in excess of $100M have to register with the SEC under the Investment Advisers Act of 1940, which includes provisions for securing electronic communication, including email and instant messages (same requirements as SEC 17a-4).
  • Archive and index of all relevant file types.
  • Secure, permission-based sharing.
  • Data is encrypted in transit and at rest.
  • Versioning and full audit trail of all sharing and file management activity.

Rule 31a-2 of the Investment Company Act of 1940 and Rule 204-2 of the Investment Advisers Act of 1940

Funds and advisers can maintain all of their records in an electronic format as long as procedures are put in place to protect records from “loss, alteration, or destruction”; that access to these records is limited to certain parties; and that “any reproduction of a nonelectronic original record on electronic storage media is complete, true, and legible.”
  • Resilient storage platform with 99.999% uptime SLA.
  • Role-based permissions for accessing archive.
  • File access is logged and auditable.

Rule 17a-4

Records, including email messages, must be preserved at least 6 years, the first 2 in “an easily accessible place”.
  • Configurable retention and data loss prevention policies enable file retention for 6 years or longer.
  • All files are easily accessible 24/7/365.

FINRA

Relevant section/topic

Compliance Requirements

How We Can Help

Books and records (Rule 3110)

Correspondence must be maintained in compliance with applicable FINRA rules and Securities Exchange Act of 1934 Rules 17a-3 & 17a-4.
Also specifies supervisory procedures for the review of correspondence between individual representatives and the public.
  • Secure, low-cost & long-term storage.
  • The storage platform supports and indexes relevant data types and formats.
  • Role-based permissions for accessing archive.
Security
Cloud Clarity invests considerable human and capital resources to ensure levels of security and protection in which you can have full confidence. Our facilities are SSAE16 Type II audited, which attests to our high standards for security. Our network security, infrastructure security, and privacy protection are paid the same level of attention.
It seems that every day brings another story of a massive hack or unprecedented data breach. And while big businesses make the most news, small businesses have just as much to fear. According to the National Cyber Security Alliance, over 60% of small businesses are hacked each year.
These numbers suggest that every business should be concerned about security. But that doesn’t mean you have to lose sleep over it. We understand that if you’re to trust us with your data, you need to understand how we’ll protect it.