📋 Free Download: 2026 HIPAA Compliance Checklist — updated for the latest OCR enforcement priorities. Get it free →
AXIS CloudSync runs on Axcient's enterprise-grade infrastructure — four globally distributed data centers, 99.999% uptime SLA, SOC 2 certified, and 256-bit AES encryption end-to-end.
99.999%
Uptime SLA
< 5 min avg downtime/year
256-bit
AES Encryption
At rest and in transit
4
Global Data Centers
US, Canada, Netherlands
99.998%
Measured Uptime
Over the past 5 years
North American & EU Presence
Infrastructure co-located in Axcient's enterprise-grade facilities across North America and Europe. Each facility is independently certified and designed for 99.999% reliability.
Atlanta, GA
Southeast US
Salt Lake City, UT
Western US
Kelowna, B.C.
Western Canada
Amsterdam
Western Europe
Powered by Axcient — Part of the ConnectWise Family
AXIS CloudSync infrastructure is co-located in Axcient's enterprise data centers. Axcient holds SOC 2 certification and SSAE 16 Type II attestation covering all hosted data. Compliance documentation is available through the ConnectWise Whistic security profile.
Facility Specifications
Every data center is engineered with redundancy at every layer — no single point of failure in power, cooling, network, or physical security.
Each facility is strategically located in a disaster-safe area with hardened construction and seismic reinforcements.
10-foot razor fence perimeter with 24/7/365 surveillance and patrols by armed security guards.
State-of-the-art data center ID and access system including video surveillance and recording.
Multi-level identity verification including biometric scanning, card keys, and badge authentication.
All equipment entering facilities is checked, audited, and logged by security personnel.
Real-time IPS and multilevel firewalls that comprehensively auto-block sources of rejected traffic.
Separate and independent firewalls dedicated to each storage node, combined with security filters inside the switching fabric.
Data Integrity & Encryption
End-to-end 256-bit AES checksums "tag" your data with cryptographically verifiable identifiers. These checksums verify data integrity throughout the entire storage and retrieval process. If corruption is detected within a block, a redundant copy is automatically used to repair it.
Redundant copies of data are split across physically separate raw storage devices in physically distinct storage subsystems — ensuring that localized disk failures, enclosure failures, or IO controller failures never affect more than one redundant copy.
Every data block is digitally signed by your encryption key and verified during restore, providing cryptographic assurance that data has not been tampered with and is 100% identical to what was originally stored.
Silent Data Corruption Protection
All data is periodically re-verified against its end-to-end checksums to proactively identify and automatically repair silent data corruption — a real threat documented at a rate of 1 in every 1,500 files in published research.
Encryption Standards
AES 256-bit
Primary encryption standard for all data at rest and in transit
FIPS-197
Federal Information Processing Standard for AES implementation
NIST 800-38A
Block cipher modes of operation for AES
HMAC-SHA-256
Hash-based message authentication code for data integrity
PBKDF2
Password-based key derivation function for key strengthening
RSA 3072-bit
Asymmetric encryption for key exchange and digital signatures
TLS 1.2/1.3
Transport Layer Security for all data in transit
Compliance & Certifications
AXIS CloudSync infrastructure carries the most rigorous independent certifications in the industry — giving healthcare, legal, and financial organizations the documented assurance they need.
Independently audited attestation that security controls meet standards for availability, confidentiality, and data integrity.
Axcient infrastructure is SSAE 16 Type II or SOC certified, providing independently audited assurance of security controls for all hosted data.
Infrastructure fully satisfies HIPAA Technical Safeguards requirements. BAA available upon request. Supports covered entities and business associates handling PHI.
Payment Card Industry Data Security Standard compliance. Data centers meet PCI DSS requirements for organizations that process, store, or transmit cardholder data.
EU data residency available in Amsterdam. Data processing agreements available. Supports GDPR Article 28 processor requirements for EU-based organizations.
SOC 2 certification is an independently audited attestation that a cloud provider's security controls meet rigorous standards for availability, confidentiality, and data integrity. Axcient's SOC 2 certification covers all AXIS CloudSync data and infrastructure.
Security
Protection against unauthorized access
Availability
System available for operation as committed
Confidentiality
Information designated as confidential is protected
Integrity
System processing is complete and accurate
Platform Security
Infrastructure certification is only part of the picture. AXIS CloudSync enforces security controls at the application layer — from login protection to remote device wipe — ensuring that even if a device is compromised, your data remains protected.
View Security Baseline GuideNo passwords or confidential information stored in plain text
Administrators can remotely wipe AXIS CloudSync data from compromised devices
Browsers locked out for 30 minutes after 5 failed login attempts
TLS configuration mitigates known vulnerabilities including POODLE and BEAST
Password complexity requirements enforce minimum length and character variety
Organizational privacy mode — data isolated per organization
HTTPS stand-alone processes running behind a firewall
Server Side Encryption (SSE) for all stored data
24/7/365 Monitoring
Multiple independent automated monitoring systems leverage different technologies to monitor the same infrastructure simultaneously — ensuring engineers are always alerted to any degradation in fault tolerance or performance.
Power, temperature, humidity, component and service health, and performance metrics collected across the entire infrastructure every few minutes.
All metrics aggregated into a global dashboard. Engineers have comprehensive remote control over every component without needing to be physically present.
Alerts processed around the clock by Axcient's team of engineers. All data center facilities staffed by qualified engineers at all times.
Multiple independent monitoring systems using different technologies monitor the same infrastructure simultaneously — no single monitoring point of failure.
HIPAA Technical Safeguards — Infrastructure Requirements
HIPAA's Technical Safeguards standard (45 CFR 164.312) requires encryption, access controls, audit controls, and transmission security for all ePHI. AXIS CloudSync's infrastructure satisfies all four requirements out of the box. Review the HIPAA Security Baseline guide for the complete configuration checklist.
Related Resources
Get the same enterprise-grade infrastructure used by thousands of businesses — with a free 14-day trial and no credit card required.