Crowd Valley took part in the Amazon Web Services (AWS) Security Roadshow, which ran from 16-23 March across several cities. The roadshow covered in detail how technologies such as Crowd Valley's, which leverages the AWS infrastructure, can benefit from cloud architecture built to satisfy the requirements of the most security-sensitive organisations.
Crowd Valley has worked closely with Amazon Web Services since the company launched, and AWS infrastructure continues to set the market standard. In its 2015 Magic Quadrant for Cloud Infrastructure as a Service, Worldwide, Gartner placed AWS in the “Leaders” quadrant and rated AWS as having both the furthest completeness of vision and the highest ability to execute. For Crowd Valley's customers, this means that they can rely on market-leading technology infrastructure without having to make any investment at all in their own servers, let alone security policies, procedures, or data archives.
For instance, Crowd Valley uses AWS's S3 service, which is designed to provide 99.999999999% durability of objects over a given year. In other words, if you store 100,000 documents in your Crowd Valley Back Office, no more than one document is expected to become corrupted in storage every 1,000,000 years. The AWS long-term backup and data archiving service, Glacier Vault Lock, is used by the SEC and FINRA to meet their 'Books and Records Rule' requirements for evidential log retention with respect to purchase and sale documents, customer records, associated person records, customer complaints, and certain other matters. Crowd Valley customers can benefit from the same long-term security of audit trails, database backups, integrated access controls and compliance measures. | Gartner: Magic Quadrant for Cloud Infrastructure as a Service, Worldwide report, Lydia Leong et al, published 18 May, 2015 |
As we at Crowd Valley plan our long-term product and security roadmap, our focus is on increasingly sophisticated policies and procedures to ensure a resilient technology environment on which our customers can rely for their security objectives and compliance requirements.
About the author - Paul Higgins
Serial entrepreneur with an operational background in finance and technology companies. Paul has over a decade's experience working in various operational and product roles within technology companies, including two B2B startups that have achieved eight-figure exits following 100% year-on-year growth.
He started his career in product development and testing roles in UBS Capital Markets and IBM's Hursley Research Lab in the UK before going on to eBay, UBS, and Barclays. Paul holds an M.A. (Hons) in Computer Science and Philosophy from Churchill College, Cambridge University. He has lived and worked in Texas in the US and Portugal, and speaks fluent Portuguese and French.
Serial entrepreneur with an operational background in finance and technology companies. Paul has over a decade's experience working in various operational and product roles within technology companies, including two B2B startups that have achieved eight-figure exits following 100% year-on-year growth.
He started his career in product development and testing roles in UBS Capital Markets and IBM's Hursley Research Lab in the UK before going on to eBay, UBS, and Barclays. Paul holds an M.A. (Hons) in Computer Science and Philosophy from Churchill College, Cambridge University. He has lived and worked in Texas in the US and Portugal, and speaks fluent Portuguese and French.