ICS Cloud Hosting for NICE Solutions
The ICS Cloud is the fastest way to install and deploy NICE solutions – in weeks instead of months.
Maintenance costs drop because ICS handles all the maintenance in the cloud.
Improved cash flow: instead of a major acquisition cost, you pay only a monthly or annual fee.
ICS Cloud Hosting is the easiest, fastest and the best cash-flow model for purchasing and deploying NICE Solutions.
Our approved NICE Cloud products include:
1. Workforce Management
2. Advanced Process Automation
3. NICE Engage
Want to know more? Call 609-843-0475 or email email@example.com
SOC 2 Compliant
Information security is a concern for all organizations, including those that outsource key business operation to third-party vendors. Rightfully so, since mishandled data—especially by application and network security providers—can leave enterprises vulnerable to attacks, such as data theft, extortion and malware installation.
SOC 2 is an auditing procedure that ensures that ICS securely manages your data to protect the interests of your organization and the privacy of its clients. For security-conscious businesses, SOC 2 compliance is an important requirement when considering a SaaS provider.
ICS Cloud Services are SOC 2-certified by Pivot Point Security, the industry leading SOC 2 compliance auditor.
Where does the ICS Cloud data reside and how is it protected?
ICS Cloud data resides on virtual servers in the UpCloud or NeverFail datacenters with locations in Chicago, San Jose and Dallas in the United States as well as, internationally in Helsinki, London, Frankfort, Singapore, and Amsterdam. These provide a 100% uptime SLA around network, power and virtual server availability.
The servers are in a physically secure location with very limited access. Other than via the Web Interface, access to this data is by a secure, validated link. ICS Cloud performs regular backups, and the backups are stored offsite at a different provider’s location to guarantee continuity.
Through the web interface via an HTTPS connection, data access is based strictly on professional roles as defined in the ICS Cloud application. Data is logically partitioned by facility.
Virtual Server Security & Employee Access
Virtual server security and data integrity is of the utmost concern. As a result, none of the technical support staff have any access to the backend hypervisors where virtual servers reside nor direct access to the NAS/SAN storage systems where snapshots and backup images reside.
Physical Security of the Servers
The site is staffed 24/7/365 with onsite security and to protect against unauthorized entry. The site has security cameras that monitor both the facility premises as well as each area of the datacenter internally. There are biometric readers for access as well as at least two factor authentications to gain access to the building. Each facility is unmarked so as not to draw any additional attention from the outside and adheres to strict local and federal government standards.
All communications are transmitted over SSL (HTTPS) for access to the ICS Cloud. This includes end user access from your site to the cloud application.
Snapshot and Backup Security
Snapshots and Backups (images) are stored weekly on an internal non-publicly visible network on NAS/SAN servers. The Disaster Recovery Plan is reviewed and tested quarterly.