Sequestered Solutions Alaska Protects Data With Datacastle RED
For the mobile workforce
This is a Press Release edited by StorageNewsletter.com on March 4, 2010 at 3:09 pmDatacastle that Sequestered Solutions Alaska (SSA) has selected Datacastle RED to power the new government data protection service DataCenter Vault.
A leading data hosting service provider in Alaska, SSA serves federal and state government agencies with secure, remote data hosting and data protection services from its Homeland Security designated ‘Critical Infrastructure Site’ located in Anchorage. Datacastle RED’s integrated feature set, centralized policy controls, and support for the NIST FIPS 140-2 standard were cited as important factors in SSA’s decision to go with Datacastle as the engine behind their new service.
“Our government and civilian customers rely on us to help them comply with stringent endpoint data security policies, especially those engaged in homeland security and defense,” said Sam Morales, CEO of Sequestered Solutions Alaska. “With DataCenter Vault powered by Datacastle RED we can offer them much more than backup and recovery. We can now give them a way to transform their mission critical information into resilient endpoint data that complies with a growing set of regulations and is friction free for the end users and IT.”
DataCenter Vault includes automatic PC backup and recovery, at rest encryption, remote data deletion, port access control and device trace in a single product suite hosted in SSA’s data center, the only Homeland Security designated facility in the State of Alaska. Datacastle RED is also available through Apps.Gov, GSA’s Cloud Computing Storefront.
“Sequestered Solutions Alaska’s Homeland Security designated facility offers the federal government more than just compliance with backup, redundancy, and cooling specifications,” said Ron Faith, CEO of Datacastle. “Government agencies and other security conscious organizations can now take advantage of Cloud-based endpoint disaster recovery and data protection while meeting such stringent security standards as AES 256-bit encryption, NIST FIPS 140-2, and deep data shredding by command or policy.”