📋 Free Download: 2026 HIPAA Compliance Checklist — updated for the latest OCR enforcement priorities. Get it free →

Home/Infrastructure
CLOUD INFRASTRUCTURE

Enterprise Infrastructure.
Built for Zero Tolerance.

AXIS CloudSync runs on Axcient's enterprise-grade infrastructure — four globally distributed data centers, 99.999% uptime SLA, SOC 2 certified, and 256-bit AES encryption end-to-end.

99.999%

Uptime SLA

< 5 min avg downtime/year

256-bit

AES Encryption

At rest and in transit

4

Global Data Centers

US, Canada, Netherlands

99.998%

Measured Uptime

Over the past 5 years

North American & EU Presence

Four Enterprise Data Centers

Infrastructure co-located in Axcient's enterprise-grade facilities across North America and Europe. Each facility is independently certified and designed for 99.999% reliability.

United States

Atlanta, GA

Southeast US

Operational
  • Disaster-safe location
  • Seismic reinforcement
  • 2N+1 power redundancy
United States

Salt Lake City, UT

Western US

Operational
  • Geographic diversity
  • Independent fiber rings
  • BGP mesh routing
Canada

Kelowna, B.C.

Western Canada

Operational
  • Canadian data residency
  • PIPEDA compliant
  • GDPR-aligned controls
Netherlands

Amsterdam

Western Europe

Operational
  • EU data residency
  • GDPR compliant
  • Low-latency EU peering

Powered by Axcient — Part of the ConnectWise Family

AXIS CloudSync infrastructure is co-located in Axcient's enterprise data centers. Axcient holds SOC 2 certification and SSAE 16 Type II attestation covering all hosted data. Compliance documentation is available through the ConnectWise Whistic security profile.

Facility Specifications

Designed for Fault Tolerance

Every data center is engineered with redundancy at every layer — no single point of failure in power, cooling, network, or physical security.

  • Each facility is strategically located in a disaster-safe area with hardened construction and seismic reinforcements.

  • 10-foot razor fence perimeter with 24/7/365 surveillance and patrols by armed security guards.

  • State-of-the-art data center ID and access system including video surveillance and recording.

  • Multi-level identity verification including biometric scanning, card keys, and badge authentication.

  • All equipment entering facilities is checked, audited, and logged by security personnel.

  • Real-time IPS and multilevel firewalls that comprehensively auto-block sources of rejected traffic.

  • Separate and independent firewalls dedicated to each storage node, combined with security filters inside the switching fabric.

Data Integrity & Encryption

Not Just Encrypted —
Cryptographically Verified

End-to-end 256-bit AES checksums "tag" your data with cryptographically verifiable identifiers. These checksums verify data integrity throughout the entire storage and retrieval process. If corruption is detected within a block, a redundant copy is automatically used to repair it.

Redundant copies of data are split across physically separate raw storage devices in physically distinct storage subsystems — ensuring that localized disk failures, enclosure failures, or IO controller failures never affect more than one redundant copy.

Every data block is digitally signed by your encryption key and verified during restore, providing cryptographic assurance that data has not been tampered with and is 100% identical to what was originally stored.

Silent Data Corruption Protection

All data is periodically re-verified against its end-to-end checksums to proactively identify and automatically repair silent data corruption — a real threat documented at a rate of 1 in every 1,500 files in published research.

Encryption Standards

AES 256-bit

Primary encryption standard for all data at rest and in transit

FIPS-197

Federal Information Processing Standard for AES implementation

NIST 800-38A

Block cipher modes of operation for AES

HMAC-SHA-256

Hash-based message authentication code for data integrity

PBKDF2

Password-based key derivation function for key strengthening

RSA 3072-bit

Asymmetric encryption for key exchange and digital signatures

TLS 1.2/1.3

Transport Layer Security for all data in transit

Compliance & Certifications

Independently Audited. Fully Certified.

AXIS CloudSync infrastructure carries the most rigorous independent certifications in the industry — giving healthcare, legal, and financial organizations the documented assurance they need.

SOC 2 Certified

Independently audited attestation that security controls meet standards for availability, confidentiality, and data integrity.

SSAE 16 / SOC

Axcient infrastructure is SSAE 16 Type II or SOC certified, providing independently audited assurance of security controls for all hosted data.

HIPAA Compliant

Infrastructure fully satisfies HIPAA Technical Safeguards requirements. BAA available upon request. Supports covered entities and business associates handling PHI.

PCI DSS

Payment Card Industry Data Security Standard compliance. Data centers meet PCI DSS requirements for organizations that process, store, or transmit cardholder data.

GDPR Compliant

EU data residency available in Amsterdam. Data processing agreements available. Supports GDPR Article 28 processor requirements for EU-based organizations.

SOC 2 CERTIFIED

What SOC 2 Certification Means for Your Organization

SOC 2 certification is an independently audited attestation that a cloud provider's security controls meet rigorous standards for availability, confidentiality, and data integrity. Axcient's SOC 2 certification covers all AXIS CloudSync data and infrastructure.

Security

Protection against unauthorized access

Availability

System available for operation as committed

Confidentiality

Information designated as confidential is protected

Integrity

System processing is complete and accurate

Platform Security

Security at Every Layer of
the Application Stack

Infrastructure certification is only part of the picture. AXIS CloudSync enforces security controls at the application layer — from login protection to remote device wipe — ensuring that even if a device is compromised, your data remains protected.

View Security Baseline Guide

No passwords or confidential information stored in plain text

Administrators can remotely wipe AXIS CloudSync data from compromised devices

Browsers locked out for 30 minutes after 5 failed login attempts

TLS configuration mitigates known vulnerabilities including POODLE and BEAST

Password complexity requirements enforce minimum length and character variety

Organizational privacy mode — data isolated per organization

HTTPS stand-alone processes running behind a firewall

Server Side Encryption (SSE) for all stored data

24/7/365 Monitoring

Always Watching. Always Responding.

Multiple independent automated monitoring systems leverage different technologies to monitor the same infrastructure simultaneously — ensuring engineers are always alerted to any degradation in fault tolerance or performance.

Real-Time Metrics

Power, temperature, humidity, component and service health, and performance metrics collected across the entire infrastructure every few minutes.

Global Dashboard

All metrics aggregated into a global dashboard. Engineers have comprehensive remote control over every component without needing to be physically present.

24/7/365 NOC

Alerts processed around the clock by Axcient's team of engineers. All data center facilities staffed by qualified engineers at all times.

Redundant Systems

Multiple independent monitoring systems using different technologies monitor the same infrastructure simultaneously — no single monitoring point of failure.

HIPAA Technical Safeguards — Infrastructure Requirements

HIPAA's Technical Safeguards standard (45 CFR 164.312) requires encryption, access controls, audit controls, and transmission security for all ePHI. AXIS CloudSync's infrastructure satisfies all four requirements out of the box. Review the HIPAA Security Baseline guide for the complete configuration checklist.

4 GLOBAL DATA CENTERS

Enterprise Infrastructure.
Startup-Friendly Pricing.

Get the same enterprise-grade infrastructure used by thousands of businesses — with a free 14-day trial and no credit card required.

Talk to Sales
Schedule a Demo