Call Today 1-877-740-5028

Defense in Depth


The ultimate layered security solution to protect your mission-critical data and applications requires people skilled and trained in security, secure technologies, and strategically reliable operational workflow.

One technical tool that supports a defense-in-depth solution is encryption - both encryption of data at rest and data in transit.

Encryption of data at rest: Data at rest can include database fileshares, workstations, laptops, tablets, iPads, phones, USB drives, flash drives, data backup tapes, CDs and DVDs, cameras and external hard drives.

Within our encrypted cloud solution, we encrypt data as it is written to drives within a storage area network (SAN), using the enterprise-class storage solution, EMC VMAX SAN. Data is decrypted as it is read from the drives. This type of built-in encryption ensures no impact on cloud performance while ensuring no risk of stored data exposure.

Click to view larger in PDF.

Encryption of data in transit: Data in transit crosses the Internet, wireless networks, from tier to tier within an application, or across wired or wireless connections without being stored. Data in transit remains in a non-persistent state - where it's not being written to disk or other media or being retained.

The combination of VPNs (Virtual Private Networks), two-factor authentication for VPN access and SSL certificates provides a completely encrypted path for data to travel. Paired with encrypted data at rest in our SANs, this creates a complete encryption solution to secure data no matter where it is.

Find out what components comprise a complete defense-in-depth hosting solution in our diagram, and read our Encryption of Cloud Data white paper for more details:

Data Encryption Services

Encrypted Cloud Hosting
Online Tech's encrypted cloud hosting provides complete encryption of data at rest at the drive-level. Using built-in, hardware-based encryption within our enterprise-class storage infrastructure, EMC VMAX SANs means we fully protect data in the cloud without affecting the performance of your applications or data in the cloud.

Paired with VPNs (Virtual Private Networks), two-factor authentication and SSL certificates, we can create a completely encrypted solution with both encrypted data at rest and in transit.


Two-Factor Authentication
Online Tech offers two-factor authentication for VPN (Virtual Private Network) access as an optimal security measure to protect against online fraud and unauthorized access for clients that connect to their networks from a remote location.

Two-factor authentication requires the use of one form of authorization (username/password), and an additional form of authentication to gain access to a network remotely. Two-factor authentication provides an extra layer of protection to ensure the user is truly the one who is allowed access to the network, and to protect against unauthorized entry.


SSL Certificate
In order to safely transmit information online, a SSL (Secure Sockets Layer) certificate provides the encryption of sensitive data, including financial and healthcare. A SSL certificate verifies the identity of a website, allowing web browsers to display a secure website.

SSL is a cryptographic protocol that can provide security as information is transmitted over the Internet. When a browser tries to connect with a website secured with SSL, the browser first requests that the web server identify itself. After the server sends a copy of its SSL certificate, the browser checks its credentials and approves it. The server then sends a digital signature to start an encrypted SSL session, and then encrypted data is shared between the browser and server.


HIPAA Compliant Cloud Hosting

The primary reason that Online Tech was our first choice was the people that are there. They were really attentive to our needs and went out of their way to make us feel like we were in the right place.

- Judson Pitt, CIO, Biotronic

Have Questions?
Call Today 1-734-213-2020


Live Chat
Events 2