We are constantly challenging ourselves to keep learning and improving. As technology evolves, so does DSM. From custom cloud solutions to professional technical services, everything we do helps our customers be successful in the cloud.
We're proud to offer the following top-tier data centers: - Atlanta, GA and Phoenix, AZ in addition to Winter Haven, FL - VMWare vCloud managed environments - Compliance options available: CJIS & HIPAA
Winter Haven + Phoenix + Atlanta
High performance, secure and integrated cloud computing services
Now in: Florida, Phoenix & Atlanta
Outsource your IT operations
Manage your infrastructure on-premise or in the Cloud
Get expert guidance
Our secure cloud services have been thoroughly audited and tested
We meet the highest security and compliance levels available
Healthcare customers can safely and securely take advantage of our cloud-based services through our HIPAA compliance infrastructure.
ISO 27001 Certified ensure information security management practices are not merely compliant, but effective.
SOC 2 Type II Attestation for cloud services and datacenter ensures our controls relating to security and availability have met and exceeded AICPA guidelines.
Security & Protection Policies
Physical & Security measures
Physical Security Measures
SOC 2 Type II certifications
Strict security policies and procedures help our clients meet regulatory demands and compliance guidelines set forth by HIPAA, CJIS, SOX, PCI, etc
365x24x7 on-site personnel and monitored video surveillance
Card key plus PIN required to access facility
Card key/biometric fingerprint required to access critical areas
Individually-locked cabinets and cages
Redundant backup power via multiple UPSs and generators
Redundant network infrastructure
Network Security Measures
Utilization of best-in-class routing and switching, with strict access to protect the borders of our network and VMWare's firewall to protect all servers
All storage sub-system traffic is segmented on a private, isolated network to protect customer data
Utilization of named user logins with granular user access to manage all systems; system access is logged to a centralized logging sub-system for auditing purposes
IPSEC for encryption to avoid sensitive data traversing the public internet
Utilization of private WAN circuits between locations (not all locations)
Frequent critical and non-critical system patching and upgrade cycles to ensure all systems are protected from known and identified threats
Data storage and backup solutions—your infrastructure is always insured against sensitive patient data breaches