Data Assurance, Access Control, and Security

Data Assurance

  • Real-time geo-replication of all data protects against lost research caused by regional disasters
  • Point-in-time recovery of a database state at 15 minute increments for the past 30 days
  • Transaction audit trails monitor and report critical information on each data change
  • Threat detection alerts administrators of unusual activities that may compromise data privacy or integrity

Access Control

  • Industry best practices for authentication and authorization
  • Integration with enterprise authentication systems
  • Data are encrypted in flight and at rest; optional user managed encryption keys

Data Security

  • RockStep and Microsoft make data security a number one priority
  • Microsoft provides the most comprehensive set of compliance offerings (including certifications and attestations) of any cloud service provider