
Data Assurance
- Real-time geo-replication of all data protects against lost research caused by regional disasters
- Point-in-time recovery of a database state at 15 minute increments for the past 30 days
- Transaction audit trails monitor and report critical information on each data change
- Threat detection alerts administrators of unusual activities that may compromise data privacy or integrity
Access Control
- Industry best practices for authentication and authorization
- Integration with enterprise authentication systems
- Data are encrypted in flight and at rest; optional user managed encryption keys


Data Security
- RockStep and Microsoft make data security a number one priority
- Microsoft provides the most comprehensive set of compliance offerings (including certifications and attestations) of any cloud service provider