Security Services

Lorem ipsum dolor sit amet, consectetur adipisicing elit.

Cloud Based Services (FEDRamp)

In the event that Cloud-based services shall be employed, we shall provide documentation and proof of accreditation to demonstrate compliance and shall be certified by the Federal Risk and Authorization Management Program (fedramp), or equivalent authorization, for use at a moderate risk, prior to launch. To demonstrate compliance, Contractor shall provide fedramp Security Authorization Package.

cloud-icon

What Is The Cloud

Software and services that run on the Internet, instead of locally on your computer, providing the availability of computer system resources, especially data storage (cloud storage) and computing power, without direct active management by the user.

How it Works

"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers allowing us to store virtual data in remote physical locations.

Our Strategy

Lorem ipsum, dolor sit amet consectetur adipisicing elit. Nemo magnam iste nobis illo mollitia, explicabo dolor iure optio voluptatibus laborum.

data-safeguard-icon

Data Safeguard

Contractor shall conduct itself in a manner that safeguards USAC Data against destruction, loss, damage, corruption, alteration, loss of integrity, commingling, or unauthorized access, which Data Safeguards shall be no less rigorous than the most protective of (a) the requirements of applicable.

What is Data Safeguarding?

Protection of data against destruction, loss, damage, corruption, alteration, loss of integrity, commingling, or unauthorized access.

How does it work?

Administrative data protection safeguards or procedural controls refer to approved policies, procedures, standards, and guidelines for running the business. Physical data protection safeguards basically ensure the protection of devices and locations which collect, process, store, and share data files and records. Technical data protection safeguards are the system controls and tools which are designed to protect data such as user authentication and passwords, account lockout during extended inactivity periods, and network intrusion prevention or detection controls.

How we use it:

XSPACES uses up to date virus protection software on all computers handling secure data. We also use software packages and operating systems with built in firewall protection. We also encrypt our wireless connection All of this ensures that no private data is lost or stolen. Your security is our priority.

pii-icon

Personally Identifiable information (PII)

Currently, in accordance with the GDPR, it is a legal obligation to keep PII safe and secure. Contractor’s information systems, applications and processes shall be approved by USAC’s Security Team. Contractor shall write, review, and update an assessment of all applicable Federal mandates. Data and documentation collected will include personally identifiable information (PII), including names, addresses, email addresses, phone numbers and commercial banking information and other confidential business information.

What is Personally Identifiable information?

Personally Identified Information is used to identify an individual through the use full name, national insurance number, drivers’ licence, financial information, and medical records.

How does this work?

First XSPACES Identifies the PII your company stores then finds all the places PII is stored. After this we start classifying PII in terms of sensitivity, deleting old PII you no longer need. Leading to establishing an acceptable usage policy and encryption of PII. Finally we eliminate any permission errors that may exist.

How X Spaces uses PII:

XSPACES shall write, review, and update an assessment of all applicable Federal mandates. Data and documentation collected will include personally identifiable information (PII), including names, addresses, email addresses, phone numbers and commercial banking information and other confidential business information.

Lorem ipsum dolor sit.

Lorem ipsum dolor, sit amet consectetur adipisicing elit. Dignissimos fuga autem ducimus impedit tenetur architecto fugiat omnis repudiandae necessitatibus dicta! Lorem ipsum dolor sit, amet consectetur adipisicing elit. Harum tempora nobis veritatis quod deserunt aut! Lorem ipsum dolor sit amet consectetur adipisicing elit. Deserunt, numquam?

ess-icon

Encryption and Secure Storage

Secure data storage is achieved in the following ways: Data encryption Access control mechanism at each data storage device/software Protection against viruses, worms and other data corruption threats Physical/manned storage device and infrastructure security Enforcement and implementation of layered/tiered storage security architecture.

encryption icon

What Is Encryption?

Encryption is the process of taking human readable text, and using a cryptographic key, scrambling that text into an unreadable format that any 3rd party that does not possess the cryptographic key cannot decipher.As a concept, secure data storage or data security refers to the automated and manual methods used to ensure the integrity and security of stored data.

vpn icon

How does it work?

Your information will be encrypted using algorithms. An encryption key is then provided so that the message can be decoded by the recipient. All algorithms encrypt and decrypt information. Security software, as well as the physical hardware that stores the data, can provide and ensure the integrity and security of stored data..

network icon

How We Use it:

X Spaces would like to ensure that all data is always encrypted. This includes both Data at rest and data in transit.

Get In Touch

For general inquiries, complience support or for more information, get in touch with one of our experts who will help.

Contact Us >