If you're looking to keep your online data safe and secure, you’re in the right place. Here’s some food for thought: The Mozy service successfully completed an independent HIPAA-HITECH SSAE 16 Type 1 audit, which resulted in a SSAE 16 Type 1 report. In addition, the Mozy service successfully completed an SSAE 16 Type 2 audit, which resulted in a SOC 2 Type 2 report, as well as completed a recertification of ISO/IEC 27001 version 2013. A good portion of Mozy’s competition skips these important steps. And that's not to mention Mozy's cloud backup service, which also uses file encryption safe enough to withstand the scariest of disasters. Your information is secure on your computer, during transit, and in our data centers. That’s why we’re the most trusted name in cloud backup.
Mozy encrypts each file before it’s sent over the wire, during transit, and at rest in our state-of-the-art data centers. But Mozy goes even further: You have the choice to use a 256-bit AES key—the same encryption standard used by the military—for your own personal encryption key or corporate encryption key, which is known only by you.
Download the data sheet on Mozy's encryption keys.
Mozy manages multiple data centers across the world. So take a deep breath—your data is ready to be restored when it’s needed. With Mozy you can expect:
Download the HIPAA Security data sheet.
If you are a Mozy Reseller Partner, Mozy supports your customers' compliance to HIPAA.
During the backup process, all files are first secured with a personal 256-bit AES or Mozy-managed 448-bit Blowfish encryption key and then transferred to a Mozy data center, via a secure SSL connection, which negotiates the highest grade encryption available based on the default settings for OpenSSL.
MozyPro servers are located in carefully chosen world-class data centers that are protected by gated perimeter access, 24x7x365 onsite staffed security and technicians, electronic card key access, and strategically placed security cameras inside and outside the building.
Mozy is an automated remote or offsite backup and a key component in any disaster recovery plan that protects against hardware failure, theft, virus attack, deletion, and natural disaster.