Security hyper-vigilance has always been the standard at TCDI. We approach security from three angles: physical security; network and infrastructure security; and application data security.

Physical Security

Security protections are in place to prevent any intended or inadvertent physical breach. Access throughout TCDI facilities is restricted by cardkey readers limiting  access on a need-to-have basis and all visitors to TCDI’s facilities must be logged in and escorted while on the premises. The datacenters are restricted by biometric access readers with access restricted to system engineers only. Additionally, each floor of each building and the datacenter uses closed circuit security cameras to monitor access and activity. After hours, the facilities are occupied and patrolled by an armed, off-duty police officer.

Network Security

TCDI takes care in isolating all client systems and data for maximum security. Each client system has its own set of servers and network segments, and all data, files and  image stores are segregated by client at all levels including backup media. Each client system has multiple internal and external facing firewalls to further protect it  against unauthorized access. Monitoring controls are in place to review security exceptions and invalid access attempts are logged and reviewed daily.

Application Data Security

All electronic data transfers, whether it is data delivery or Internet access through the ClarVergence® platform, use SSL protocol. Data access within the ClarVergence  platform is controlled by client-defined security groups and can be controlled down to the field level. All user actions within the platform are logged and can be provided when needed.