IT Software and Support
ECMCI provides 24/7 IT Technical Support, we value the importance of your business continuity and profitability within your facility. Our support team are HIPPA well-trained in handling technical concerns.
ECMCI’s goal is to deliver the power of cloud productivity to businesses of all sizes, helping to save time and money and free up valued resources. Our web-based “Software as a Service, SaaS” model for outsourcing accounting services, Quality Assurance, and Electronic Health Record (EHR) enable businesses to instantly reduce overhead, streamline workflow and improve efficiency and productivity. The single web-based portal ensures simple and easy accessibility for our clients from any device, anytime and anywhere securely. Users simply log into the secured web portal and start working. Users also have the ability to upload and download files, and organize and assign permission online (standardized file format such as Word, PFG, and JPEG are accepted).
Unlike traditional on-premises application that resides behind a corporate firewall and may be accessed over the virtual private network (VPN), ECMCI’s service is designed specifically for secure access over the Internet. The single sign-on system helps users create and use strong passwords that keep their service safe. Connections established over the Internet to ECMCI’s service are encrypted using industry-standard, 128-bit Secure Sockets Layer/Transport Layer Security (SSL/TLS) encryption. ECMCI supports additional security measures such as:
Data encryption on transfer – Data is encrypted using SSL on transfer.
Data encryption at rest – Data is encrypted on servers using 256-bit AES.
Administrative auditing – Manages users, groups and access permissions. Monitors user activity.
Sophisticated user password policy enforcement – Manages complexity requirements, histories and forced resets.
Role-based access controls – Chooses editing, viewing, previewing & uploading permissions.
Password-protection & time-based controls – Password Policy requires user to reset the password every 60 days.
Comprehensive reporting tools – Drills down and generates reports on user activity.
Security and Reliability
We ensure that the security of our services is vigilantly maintained, regularly enhanced, and routinely verified through testing. Our data centers are strategically located around the world to ensure availability and redundancy. System updates, maintenance and data backup can generally be performed without interruption to our users. Customers’ data is stored in a redundant environment with robust backup, restore and failover capabilities to enable availability, business continuity, and rapid recovery. Multiple levels of data redundancy are implemented, ranging from redundant disks and full data replication to a geographically diverse data center.
Physical Security
ECMCI ensures that our data centers are physically secured by controlling accessibility through multiple security checks which include the following industry-standard features:
Secure physical access for authorized personnel only: Access is restricted by job function, on-premises security officers, video surveillance and security alarms
Redundant power supplies, including two separate power feeds, battery backup, and power generators
Primary Internet Connectivity (marine fiber optic cable), and Secondary Internet Connectivity (via satellite link)
Climate control to ensure that our equipment runs at optimal temperature and humidity
Fire prevention and extinguishing systems
Strategic location of data centers, which offer geographically local hosting with global availability
Secure network design: multiple separations of network segments which help provide physical separation of critical, back-end servers and storage devices from public-facing interfaces
Logical Security
Logical security is as important as physical security. Our logical security features include:
Data isolation – data storage and procession is logically segregated among customers.
Hosted applications security – authenticated, encrypted communications and protection against malicious software
Network-level security measures – industry-standard Transport Layer Security (TLS)/Secure Sockets Layer (SSL) establishes a highly secure browser-to-server connection to help provide data confidentiality and integrity between users and data center.
Monitoring and risk reduction – hardware and software subsystems monitoring ensues continuous performance of key subsystems at optimal level.