At Complete Controller, we want to provide peace of mind to our customers. We know that security, data integrity, and confidentiality are an integral part of our continued success. Since our inception, the Complete Controller platform has been built with security first. Our security protocols protect all data in entry, transit, and storage. We have steadily grown our cloud services footprint over the past ten years, and each major advancement has included measures to further protect your data. To determine whether Complete Controller is the best service provider for your business, it is important to take a closer look at our security methods and protocols, as this is one of our differencing features.
Complete Controller maintains a fleet of dedicated servers. These servers are housed in a secured location with keycard protocols, biometric scanning protocols, and around-the-clock interior and exterior surveillance. Our data center is powered by conditioned electricity, connected with Uninterruptible Power Supplies, and backed by onsite power generators. Our data center has received global security certifications and compliance verifications, including the ISO 27001 standard.
Our servers and data network are completely private, and inaccessible from the commercial Internet. We leverage the Cisco SecureX Framework with a Cisco ASA Firewall to ensure a comprehensive and highly secure enterprise solution. Our full complement of security services includes adaptive Virtual Private Networks (VPN), Intrusion Prevention, content security, and preemptive data policy enforcement. Our software employs the first VPN solution to use Secure Socket Layer (SSL) with the Datagram Transport Layer Security (DTLS) protocol, which is more secure than traditional VPN connections.
Our servers contain N+1 hardware redundancies, and all data is stored on fully redundant RAID 1 and RAID 5 drive arrays. Our servers are backed-up nightly, and all backups and further encrypted before being stored according to our Data Preservation and Retention Policy.
The data within our servers is completely inaccessible outside of our Cisco framework. Additionally, our servers employ multiple onboard software security layers. At the core of this security is Microsoft’s Active Directory. Active Directory is responsible for on-server authentication, access and authorization, and assigning and enforcing our tiered security policies. Access is strictly controlled, and fully protected. No data can be accessed without specific allowance; even our internal support teams are governed by this same-tiered security policy.
Your accounting firm has an obligation to safeguard your personal and professional financial information. Complete Controller is the industry leader in this regard, and enjoys an unblemished record of data protection, privacy, and security. The Complete Controller security solution provides a highly controlled environment, so your data stays safe!
Chief Technology Officer