Hosting

Egress Software have partnered with two key service providers, Microsoft Azure and Amazon Web Services (AWS), to provide choice with unrivalled security and flexibility. As a baseline all providers must have a minimum of ISO27001 certified data centres. UK- and EU-based customers will be onboarded to UK infrastructure by default; US- and Canada-based customers will be onboarded to the US infrastructure. For other regions, please discuss with your account team. We also offer on-premise versions of our applications.

Microsoft Azure is our default platform for all services globally. It is an open and flexible cloud platform that enables Egress Software to quickly build, deploy, and manage applications across a global network of Microsoft-managed datacenters. The Microsoft Azure platform is used for those organisations that require global accessibility and resilience and who are utilising other Microsoft Cloud platforms such as Microsoft Office 365 or Exchange online.

To help organizations comply with national, regional, and industry-specific requirements governing the collection and use of individuals’ data, Microsoft offers the most comprehensive set of certifications and attestations of any cloud service provider. 

To demonstrate that these controls deliver compliance you can rely on, Microsoft enterprise cloud services are independently validated through certifications and attestations, as well as third-party audits. In-scope services within the Microsoft Cloud meet key international and industry-specific compliance standards, such as ISO/IEC 27001 and ISO/IEC 27018, FedRAMP, and SOC 1 and SOC 2. They also meet regional and country-specific standards and contractual commitments, including the EU Model Clauses, UK G-Cloud, Singapore MTCS, and Australia CCSL (IRAP). In addition, rigorous third-party audits, such as by the British Standards Institution and Deloitte, validate the adherence of our cloud services to the strict requirements these standards mandate.

We may sub-contract the processing of your commercial data to one of the sub-processors listed below. We have entered agreements with these sub-processors on suitable terms to comply with the Data Protection Laws and to protect your data. We'll remain fully responsible for the acts, omissions and defaults of each sub-processor as if those were our acts, omissions and defaults.

 

In 2006, Amazon Web Services (AWS) began offering IT infrastructure services to businesses in the form of web services -- now commonly known as cloud computing. One of the key benefits of cloud computing is the opportunity to replace up-front capital infrastructure expenses with low variable costs that scale with your business. With the Cloud, businesses no longer need to plan for and procure servers and other IT infrastructure weeks or months in advance. Instead, they can instantly spin up hundreds or thousands of servers in minutes and deliver results faster.

Today, Amazon Web Services provides a highly reliable, scalable, low-cost infrastructure platform in the cloud that powers hundreds of thousands of businesses in 190 countries around the world, with data centre locations in the U.S., Europe, Brazil, Singapore, Japan, and Australia.

At a high level, we’ve taken the following approach to secure the AWS infrastructure:

  • Certifications and Accreditations. AWS has achieved ISO 27001 certification and has successfully completed multiple SAS70 Type II audits. AWS will continue to obtain the appropriate security certifications and conduct audits to demonstrate the security of the infrastructure and services. For more information on risk and compliance activities in the AWS cloud, consult the Amazon Web Services: Risk and Compliance whitepaper.
  • Physical Security. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. AWS infrastructure is housed in Amazon-controlled data centers throughout the world. Only those within Amazon who have a legitimate business need to have such information know the actual location of these data centers, and the data centers themselves are secured with a variety of physical barriers to prevent unauthorized access.
  • Secure Services. Each of the services within the AWS cloud is architected to be secure and contains a number of capabilities that restrict unauthorized access or usage without sacrificing the flexibility that customers demand. For more information about the security capabilities of each service in the AWS cloud, consult the Amazon Web Services: Overview of Security Processes whitepaper.
  • Data Privacy. AWS enables users to encrypt their personal or business data within the AWS cloud and publishes backup and redundancy procedures for services so that customers can gain greater understanding of how their data flows throughout AWS. For more information on the data privacy and backup procedures for each service in the AWS cloud, consult the Amazon Web Services: Overview of Security Processes whitepaper. The AWS Security Center provides links to technical information, tools, and prescriptive guidance designed to help you build and manage secure applications in the AWS cloud. Our goal is to use this forum to proactively notify developers about security bulletins. Such transparency is the backbone of trust between AWS and our customers.

We may sub-contract the processing of your commercial data to one of the sub-processors listed below. We have entered agreements with these sub-processors on suitable terms to comply with the Data Protection Laws and to protect your data. We'll remain fully responsible for the acts, omissions and defaults of each sub-processor as if those were our acts, omissions and defaults.

Try Egress for Free Today

Start your free trial Book a demo