Defense in Depth - Datapipe

Defense in Depth

Defense in Depth is a practical strategy for achieving the highest possible Information Assurance (IA) with the least possible sacrifice, commonly known as the balance of risk versus reward.

The Datapipe Defense in Depth model follows a multilayered approach in which each layer is mutually exclusive. Highly resilient security controls are designed to progressively weaken an attack.

The security community has identified three categories paramount to information security policy: People, Technology, and Operations.


Within any organization, statistically, people are the weakest link in the security chain. Datapipe requires all employees to undergo comprehensive background checks to ensure your confidence in our team. Every member of our team is thoroughly trained in all aspects of privacy and best practices to maintain the highest levels of security through the duration of your IT lifecycle.


Even the best business models are at risk from security flaws in your solution's Confidentiality, Integrity and Availability (CIA). In general, the security community regards CIA as those aspects of your solution which:

  • Define and enforce appropriate access levels for information in order to prevent disclosure of information to unauthorized individuals or systems
  • Ensure only authorized data modification and/or deletion and the ability to restore unintentional data changes by authorized users
  • Maintain high availability of information, including prevention of DoS or DDos attacks, through uninterrupted accessibility and performance of systems and services

Our security services suite is designed to go beyond industry standards and maintain the CIA of your solution. Additionally, Datapipe's certified support and security staff are available to assist you 24/7/365 to ensure the security of your solution.

Perimeter Defense Layer

  • Firewall/VP
  • Distributed Denial of Service (DDoS) Protection
  • 2-Factor Authentication
  • Monitoring
  • Intrusion Detection System (IDS)
  • Multi-tier Architecture
  • Event Management

Network Integrity Layer

  • Monitoring
  • Intrusion Detection System (IDS)
  • Multi-tier Architecture
  • Event Management 

Content Filtering Layer

  • AntiMalware
  • AntiSpam
  • Web Application Firewall

Host Security Layer

  • Secure Configuration Assessment
  • Patch Management
  • Intrusion Prevention Services (IPS)
  • System Integrity monitoring
  • AntiMalware
  • Vulnerability Assessment
  • Event Management

Data Protection Layer

  • Standard Database Encryption
  • Transparent Database Encryption
  • Backup Encryption


Datapipe fosters a culture of intense operational security that permeates all levels of our organization. These policies and procedures are the foundation of day to day operations in all of our facilities, and meet the highest standards in the industry. For example, Datapipe employs strong access control measures across multiple aspects of our operations. Some of these include: security entry cards, biometric hand scanners, thin clients, two factor authentication, email encryption of sensitive data, and PIN number verification for account access.

SSAE16 Certified

Demonstrating our commitment to compliance and security, Datapipe’s U.S. Data Centers have completed SSAE 16 audits. The Statement on Standards for Attestation Engagements (SSAE) No. 16 was finalized by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) in January 2010 and became effective on June 15, 2011.

SSAE 16 effectively replaces SAS 70 as the authoritative guidance for reporting on service organizations. SSAE 16 was drafted with the intention and purpose of upgrading the U.S. service organization reporting standard so that it mirrors and complies with the new international service organization reporting standard – ISAE 3402.