Peak 10 stands out from other cloud and data center service providers because of our consultative approach ─ and for the strong emphasis we place on regulatory compliance.
We realized early on that many of the IT infrastructure services we provide to customers are considered part of their operations. That makes them part of their overall IT internal control programs. That’s why Peak 10 goes beyond the requirements of our industry to maintain a well-governed, high quality infrastructure. We provide the necessary security controls and documented processes to meet a number of regulatory requirements, which enables us to help ease the burden on our customers that are subject to these compliance regulations.
Every year Peak 10 undergoes rigorous audits by independent firm specializing in attestation and compliance services. In the past year, the company has successfully completed independent examinations under the SSAE 16 , ISAE 3402, PCI DSS, and AT-101 audit standards. We are among a select number of data center and cloud services providers that can provide SOC 1, SOC 2 and SOC 3 reports, which can be used to address a number of regulatory requirements including those related to Sarbanes Oxley.
In addition, Peak 10 is certified under the U.S. Department of Commerce Safe Harbor Program, known as the U.S.-EU Safe Harbor Framework or “Safe Harbor”. This certification gives our customers and their end users confidence that we are meeting the required criteria for preventing accidental disclosure or loss of personal data collected from EU citizens.
Peak 10 is also a Certified Level 1 Service Provider under PCI DSS 2.0, which means that all processes and components under our control are PCI DSS compliant ─ something of increasing importance to the large number of companies that are required to adhere to the security requirements outlined by the payment card industry for handling credit card information.
One of our primary goals at Peak 10 is to protect the data entrusted to us by our customers. Our focus on high-level security protocols enables us to continually meet increasingly stringent compliance requirements and ensure the integrity and security of our customers’ data.
Much of what regulatory requirements specify are controls that help keep data secure. Because data is so important to most companies’ operations, it is in their best interest to adhere to the requirements and work with companies like ours that can do so as well.