Data Security

With the multi-tenant nature of the cloud environment, data security becomes an important concern for the integrity and compliance of  your company’s business data.

Telsist online storage takes data security and compliance seriously. With Telsist Data Assurance powered by Asigra, your company data is protected with the most secure agentless data security platform in the industry compliant with HIPAA and PCI amongst many others.


 Encryption Advantage

  1. Asigra encrypts the data in-flight and at-rest from end-to-end.
  2. FIPS 140-2 certified – an independent third-party certification.
  3. From handheld devices like tablets (DS-Tablet Client) and smart phones (DS-SmartPhone Client) to remote laptops (DS-Mobile Client)or remote office or branch sites (DS-Client). to central data repositories within the data center (DS-System or BLM).
  4. Key escrow management.
  5. Password rotation support.
  6. Data destroyed with certificate of destruction.


Data Security Track Record

  1. Zero breaches or compromised systems in the last 26 years of operation and over 550,000 end- customer sites worldwide that are protected by Asigra technology.
  2. IANA2-registered ports.
  3. All data stored in compressed and encrypted format.
  4. Digital signature for every file and block of data.
  5. Data on disk resides in self-describing format.
  6. Background Autonomic Healing and System Admin.
  7. Restorability Validation Process (digital signature check).


Data Compliance Advantage

Listed below are the ten most common data compliance regulations that Telsist online storage addresses. Contact Telsist for a complete list of data compliance requirements available.

  1. Sarbanes Oxley (SOX)
  2. U.S. Health Insurance Portability and Accountability Act (HIPAA)
  3. Canada’s Personal Information Protection & Electronic Data (PIPEDA)
  4. Gramm-Leach-Bliley Act (GLBA)
  5. Federal Information Security Management Act (FISMA)
  6. Payment Card Industry Data Security Standard (PCI DSS)
  7. Basel II
  8. Safe Harbour
  9. Patriot Act
  10. American Recovery and Reinvestment Act (ARRA)


Telsist vs.Traditional

Telsist Data Assurance online storage ensure that all data that is backed up is aggregated which allows for immediate recovery.  Company data is automatically & securely transferred offsite to Telsist’s data center using FIPS 140-2 certified data security requirements.

With traditional backup, the solution is not centralized which  often leads to difficulties in obtaining and providing records to auditors in a timely manner.  In addition, the backup architecture requires additional third party products or manual involvement when transferring data offsite on disk or tape and is deemed unsecure or unreliable

Telsist is committed to the availability and security of company data.  Contact us on how we can help your company comply with industry data security requirements.