Skip to content

The Premier Hosting and Private Cloud
provider for CSI / SyteLine and ISM




You’re out of business if your environment isn’t protected. And at Apptrix, we take security very seriously.

Ensured business continuity and application high availability

The latest security, infrastructure, backup technology, policies and procedures must be in place and monitored to protect every layer to ensure business continuity.  Apptrix not only delivers the latest technology but also manages and monitors the security, infrastructure and backup systems to confirm that your mission critical applications are available when you need them.

With our use of virtualization across multi-node server clusters and SAN technology, Apptrix historically has provided less than .1% unscheduled downtime for your systems within the same data center.

Consistent, accessible, well-protected backups

Apptrix takes regular backups of your databases and servers for all environments, not just production.  We provide near-real-time replication to a secondary data center for protection and availability if there was a failure at the primary site.  Apptrix also offers long-term retention of your backups to meet your company’s requirements.

Essential security protection using the latest proactive technology

Apptrix provides essential security protection that incorporates reactive antivirus and spyware detection with the latest proactive technology.  In addition, Apptrix offers highly restrictive and protected industry specific environments that include ITAR, FDA, HIPAA and PHIPA level security.  Special segmentation, controls and monitoring for systems are needed to meet these higher security constraints.

And as part of the security suite, Apptrix can maintain your change control process and ensure that security is set appropriately at the OS and SQL level for each user and each environment.  We take security seriously and can assist our customers in aligning their application security utilizing SOC 2 / SSAE 18 audited control mechanisms and practices.

International Traffic in Arms Regulations ITAR
Scroll To Top