Overview

Cornerstone Cloud Servers are hosted and delivered by top web security service provider and is responsible for the security of its actual data centers. Cornerstone is responsible for monitoring, managing and securing our cloud software product.


Top-Notched Security Infrastructure

Cornerstone.ph provides state-of-the-art security to ensure that our customer data is never compromised. We know that security is crucial very crucial to our customers - that's why security is our top priority. We devote significant resources to continually improve our security infrastructure in both our website and software. This has led us to develop an unsurpassed security and privacy for our client's information. With Cornerstone, you enjoy protection and peace of mind that only our security can provide. Among other security measures, Cornerstone provides:

Experienced, professional web developers and security specialists dedicated to data and systems protection and improvement

Ongoing evaluation of emerging security developments and threats


Data Storage and Backup

At Cornerstone, data at rest is encrypted using industry standard encryption.  Additionally, all communications and transactions using our software are protected with HTTPS. All customer data is stored on a database served by a database server cluster for redundancy. All customer data is stored on carrier-class disk storage using RAID disks and multiple data paths. Backup tapes are immediately cloned to verify their integrity, and the clones are moved to secure, fire-resistant, off-site storage on a regular basis.


Secure Server Environment

Cornerstone's system is hosted in a secure server environment that is ISO 27001, SSAE 16, ISAE 3402, and PCI DSS compliant and utilizes advanced security technologies that include biometric, facial recognition, and hardware token identification. Our Tech Team monitors notification from various sources and alerts from internal systems to identify and manage threats.


People and Access

At Cornerstone, only a few members of our Tech Team have access to the production environment for the purposes of maintaining our cloud services and assisting our customers.  Additionally, we monitor all access to Tempo Cloud.

Customers are responsible for maintaining the security of their own login information.


Product and Security Testing

Cornerstone Team tests all code for security vulnerabilities before any and all releases, regularly scanning our infrastructure for vulnerabilities and potential security threats. Cornerstone Tech Team performs the following procedures on regular basis:

  •     Application vulnerability threat assessments
  •     Network vulnerability threat assessments
  •     Security control framework review and testing
  •     User roles and permissions testing




  •  
  •  
  •  

We provide security and compliance services designed to help protect our clients’ information and data. This effort also focuses on ensuring that Cornerstone has the ultimate controls in place to manage the potential risk of any and all interruptions that may impact our service.