Skip to content
A cover page titled "Executive Partner Summary Q1 - 2024" for WIRED Security Inc. features a blue and purple digital network design. It's prepared for DriveSavers Data Recovery and includes a circular logo at the bottom.

About WIRED Security Inc.’s Network Security Audit

DriveSavers undergoes annual security audits on its perimeter and network systems. These audits are conducted by a team of independent information security and technology consultants from WIRED Security, Inc., to ensure that adequate controls and safeguards are in place for safely hosting data belonging to our customers. A thorough review of our Business Continuance Plan, Information Security Policy and the recently completed SOC 2 Type II audit documentation is also performed.

DriveSavers has deployed a full “Defense-in-Depth” network. All hardware and software used by DriveSavers has multiple industry certifications including, but not limited to NIST, NEBS level 3, ICSA, NSS and FIPS. The DriveSavers Data Recovery computing network environment (as tested) has an excellent ability to avoid information security breaches.

DriveSavers undergoes these audits annually. The results of our most recent and up-to-date audits can be found aquí.

View our WIRED Security Inc.’s Network Security Audit

 

At the heart of our certified secure data recovery environment is a “defense-in-depth” network, verified in our SOC 2 Type II auditing process to be “a formidable defense” for the information and data that it hosts.

 

—Michael Hall, CISO, DriveSavers

Benefits of Working with an SOC 2 Type II Audited Data Recovery Service Provider

By posting proof that DriveSavers undergoes a company-wide audit on an annual basis, it differentiates itself from all other data recovery service providers in the industry today. This audit verifies our qualifications to handle enterprise-class recoveries, and support those customers who must maintain compliance with data privacy and data security regulations, such as:

Una auditoría anual garantiza a nuestros clientes y socios que sólo los ingenieros de recuperación de datos autorizados tienen acceso a sus datos personales y confidenciales. Una vez finalizado el proceso de recuperación, los datos se almacenan en nuestra red segura hasta que se verifica la integridad de los mismos. Ofrecemos soluciones personalizadas para la recuperación de archivos y discos encriptados. Los datos se protegen durante el tránsito hacia nuestras instalaciones y de vuelta. Si se requiere acceso instantáneo a los datos recuperados, estos se transmiten a través de un sitio FTP seguro. Si nos lo solicita, podemos destruir los datos de forma segura y permanente.

Back To Top
Buscar