This document is an overview related to disaster recovery (DR) and security efforts made by Xcentric. This whitepaper covers:
- Backup strategy and technology
- Risk management
- Incident response
- Firewalls and intrusion detection
- and more!
Logical security procedures are defined to ensure authorized individuals have access to systems, servers, and data necessary to support the business mission. Logical security is enforced by the process of authentication and authorization practices directly tied to access control lists that define what resources users are permitted to access.