CloudHostResource
Home Showcase Search Directory Reviews Articles Forum
FindCloudHost.com > Cloud Web Hosting News

IT Infrastructure and Cloud Solutions Provider Peak 10 Announces Data Centers and Cloud Infrastructure Validated for PCI DSS 2.0 Level 1 Compliance


January 18, 2013
by Staff Writer




Charlotte, North Carolina-based IT infrastructure and cloud solutions provider Peak 10 has announced that its data centers and cloud infrastructure have been validated for Payment Card Industry Data Security Standard (PCI DSS) 2.0 Level 1 compliance. The company's PCI DSS validation means that utilizing its facilities and cloud infrastructure can help its customers meet their own PCI compliance requirements.

PCI DSS is an information security standard that accredits organizations managing credit card information for major credit, debit, e-purse, prepaid, e-purse, ATM and POS cards. Peak 10's validation was based on an audit by a Quality Security Assessor (QSA) which looked at the company's practices and security controls and considered them against best practices designed to keep cardholder information safe both when payments are processed and when information is stored.

Alongside PCI DSS validation, Peak 10 also completed annual audits of both its cloud services and data center services for compliance against Statement on Standards for Attestation Engagements 16 (SSAE 16), the Health Information Technology for Economic and Clinical Health (HITECH) Act, and the Health Insurance Portability and Accountability Act (HIPAA).

“While customers remain responsible for many aspects of the compliance of their technologies and applications, their use of Peak 10’s cloud infrastructure can help meet many of the requirements for compliance with PCI DSS and HIPAA/HITECH,” explained Peak 10’s Director of Quality Assurance, David Kidd. “The successful completion of this most recent series of audits is part of our continued commitment to maintaining a well-governed, high-quality IT service environment.”

Peak 10's cloud solution offers multi-layer protection and rigorously limits data access. Continual monitoring provides security against cyber attacks and threats. The solution features antivirus management and vulnerability scanning, while the company's technical staff continually track resources to enhance security.






Comment News

Connect with  or  or 


Name:
Email:
Your Message: