Your SOX-compliant Cloud

  • Avoid complexities and hassle
  • Save time
  • Get the data security and access controls you need
  • Achieve SOX compliance cost-effectively

Concerto SOX compliance includes

Pre-developed security standards
 Processes to help ensure financial and proprietary information remains private
Authenticated user access
State-of-the-art security & 27/7/365 monitoring & management
 Customization to implement specific settings/unique requirements

A thorough security approach

Concerto Cloud Services Security Overview

  • Centralized and automated anti-malware and OS patching
  • Identity management
  • True network segmentation and isolation from ingress to egress
  • Data in-motion encryption by default
  • Multiple firewall segments operating at layer 1-7 of the OSI stack
  • State-of-the-art IDPS solution monitored and managed 24x7 by a dedicated security operations center
  • Reverse Proxy services
  • “Other” proprietary security mechanisms and practices
  • Intelligent, multi-point syslog solution 

Additional Options:

  • Vulnerability or penetration tests
  • Storage for retention of logging files
  • Any Enhanced Security Package item


  • SIEM (Security Information and Event Management) Encryption
  • Syslog (Logging)
  • Two-factor authentication
  • Encryption (Required for many regulatory requirements such as FIPS-140-2, HIPAA, and more)
  • One Vulnerability and Penetration Test per year, with a report to the customer of the findings

*Any Enhanced Security Package item can be added individually.