Security Our Priority of Protection Onit takes a cutting-edge approach to security. It’s a top priority and one we take exceedingly seriously. With state-of-the-art technology to ensure your data is protected, collaborating on projects securely (with access to only authorized participants) has never been easier. Security Types Our data is secured using bank-grade 256-bit Secure Sockets Layer (SSL) encryption and is stored in an enterprise-class, secured hosting environment that is backed up daily. All data within Onit remains the property of the project owner and cannot be accessed by any other user. Physical Security Application Security System Security Operational Security Key Specifications SSAE-18 Type II SOC II datacenter Dedicated servers Redundant power connections with standby generators Multiple redundant network connections Biometric scanning for controlled data center access Physical security audited by an independent firm 24/7 video monitoring Key Specifications Custom-hardened Unix kernels Managed virtual private cloud Managed continuous firewall monitoring Policies and Procedures By policy, employees prohibited from accessing private data Onit claims no ownership of your data 24/7 monitoring and escalation All users must be verified by email Key Specifications System installation using hardened, patched OS System patching configured to provide ongoing protection from exploits Dedicated firewall and VPN services to help block unauthorized system access Data protection with managed backup solutions Distributed Denial of Service (DDoS) mitigation services Key Specifications Onit audits to SSAE-18 SOC 2 Type 2, SOC 1 Type 2 and HIPAA standards, verified by an independent auditing firm Encryption for all administrative traffic (HTTPS, SFTP, SSH) Encryption for all customer traffic (HTTPS) Datacenter employees trained on documented information security and privacy procedures Access to confidential information restricted to authorized personnel only, according to documented processes Systems access logged and tracked for auditing purposes Secure document-destruction policies for all sensitive information Fully documented change-management procedures Independently audited disaster recovery and business continuity plans SEE FOR YOURSELF Legal has a golden opportunity to evolve its role as a business protector. Onit’s solutions can help Legal connect more deeply across the enterprise to improve operational and cost efficiency while simultaneously influencing faster revenue generation and business growth. Talk To An Expert