Features of the secure hosting facility include:


  • Fully-redundant power and climate control
  • Five layers of physical security
  • Redundant network connectivity
  • Facility is audited and approved to operate in accordance with the access control policies and procedures developed and maintained by the GSA, as set forth in GSA IT Security Policy (CIO P 2100.1D); CIO-IT Security-01-08, Auditing and Monitoring
  • 24x7x365 service and connectivity monitoring
  • Two party access to all server hardware

WidePoint’s secure hosting service meets the promises of a National Information Infrastructure (NII) that Internet-centric transactions will:


  • Improve citizens’ access to government services and information
  • Facilitate the flow of government information within and among the different
    branches and agencies
  • Reduce government operating costs through the implementation of electronic
    business processes

WidePoint-ORC fulfills these promises by offering managed services that include strong digital signatures ensuring the identity of the senders and receivers of electronic messages and the integrity of the messages themselves. As a technology leader in the implementation, deployment and use of public key cryptography and public key certificates to bind a person’s public key to their identity, WidePoint is uniquely qualified to provide these services.


Contact WidePoint-ORC to discuss how we can implement
the secure solution that meets the needs of your organization.

Email us at [email protected]
Expedited Services/Same-day Issuance
You are being directed to our Secure Credentials Ordering Portal