Features of the secure hosting facility include:
- Fully-redundant power and climate control
- Five layers of physical security
- Redundant network connectivity
- Facility is audited and approved to operate in accordance with the access control policies and procedures developed and maintained by the GSA, as set forth in GSA IT Security Policy (CIO P 2100.1D); CIO-IT Security-01-08, Auditing and Monitoring
- 24x7x365 service and connectivity monitoring
- Two party access to all server hardware
WidePoint’s secure hosting service meets the promises of a National Information Infrastructure (NII) that Internet-centric transactions will:
- Improve citizens’ access to government services and information
- Facilitate the flow of government information within and among the different
branches and agencies - Reduce government operating costs through the implementation of electronic
business processes
WidePoint-ORC fulfills these promises by offering managed services that include strong digital signatures ensuring the identity of the senders and receivers of electronic messages and the integrity of the messages themselves. As a technology leader in the implementation, deployment and use of public key cryptography and public key certificates to bind a person’s public key to their identity, WidePoint is uniquely qualified to provide these services.