Security is one of the most frequently discussed topics

In the data center and IT services world.  When selecting a services provider, there’s no such thing as too much emphasis on security.  Make sure that the service provider you choose places a strong focus on security—as in the end, it’s your customers’ data that you’re placing in the hands of that provider.

RampRate can help to bring clarity to the security services marketplace to find the best fit for your specific business needs.

Here are a few certifications to look for with your data center and cloud services provider:


The Statement on Standards for Attestation Engagements No. 16 replaced SAS 70 in June 2011. A SSAE 16 audit measures the controls relevant to financial reporting. Like SAS 70, the SSAE 16 standard focuses on guidance for auditors assessing financial statement controls at service organizations.
This is the basis of the SOC 1 report. The SOC 2 and SOC 3 reports both look at a service organization’s controls relevant to the security, availability, or processing integrity of a service organization’s system or the privacy or confidentiality of the information the system processes.
SOC 1 – The first of three new Service Organization Controls reports developed by the AICPA, this report measures the controls of a data center as relevant to financial reporting. It is essentially the same as a SSAE 16 audit.
SOC 2 – SOC 2 measures controls specifically related to IT and data center service providers. The five controls are security, availability, processing integrity (ensuring system accuracy, completion and authorization), confidentiality and privacy.
SOC 3 – This report includes the auditor’s opinion of SOC 2 components with an additional seal of approval to be used on websites and other documents. The report is less detailed and technical than a SOC 2 report.
SOC 1 and SOC 2 are similar to SAS 70 in that both have type 1 and type 2 report options:
Type 1 – A data center’s description and assertion of controls, as reported by the company.
Type 2 – Auditors test the accuracy of the controls and the implementation and effectiveness of controls over a specified period of time.

ISO / IEC 27001:2005 and 27001:2013 Information Security Management System Standard

ISO is the world’s largest developer and publisher of international standards. ISO certification means that providers can offer products and services which meet and exceed the specifications of their customers by implementing the quality, safety, security, environmental and energy management standards with the widest possible acceptance in data center sector.

This is the most widely-accepted certification available for supporting information, physical security, and business continuity ISO 27001 ensures that:

– risks and threats to the business are assessed and managed

– physical security processes such as restricted/named access are enforced consistently

– audits are conducted regularly at each site that include tests of security and cctv planning and monitoring

CEO: IT Should Deliver Value. Without Risk

PCI-DSS Payment Card Industry Data Security Standard

The PCI Data Security Standard (PCI DSS) ensures the safe handling of sensitive information and is intended to help organizations proactively protect customer account data. For providers that don’t monitor or have access to customer data, applicability is restricted to physical security access to customer equipment through a combination of management systems and physical access safeguards and procedures.


Mandated by the U.S. Health and Human Services Dept., the Health Insurance Portability and Accountability Act of 1996 specifies laws to secure protected health information (PHI), or patient health data (medical records). When it comes to data centers, a hosting provider needs to meet HIPAA compliance in order to ensure sensitive patient information is protected.

A HIPAA audit conducted by an independent auditor against the OCR HIPAA Audit Protocol can provide a documented report to prove a data center operator has the proper policies and procedures in place to provide HIPAA hosting solutions.

No other audit or report can provide evidence of full HIPAA compliance.

FedRAMP – The Federal Risk and Authorization Management Program

FedRAMP provides a cost-effective, risk-based approach for the adoption and use of cloud services by making available to Executive departments and agencies:

• Standardized security requirements for the authorization and ongoing cybersecurity of cloud services for selected information system impact levels;

• A conformity assessment program capable of producing consistent independent, third-party assessments of security controls implemented by Cloud Service Providers (CSPs);

• Authorization packages of cloud services reviewed by a Joint Authorization Board (JAB) consisting of security experts from the DHS, DOD, and GSA;

• Standardized contract language to help Executive departments and agencies integrate FedRAMP requirements and best practices into acquisition; and

• A repository of authorization packages for cloud services that can be leveraged government-wide.

FedRAMP supports the U.S. government’s mandate that all U.S. federal information systems comply with the Federal Information Security Management Act of 2002 (FISMA).

The Federal Information Security Management Act (FISMA)

United States legislation that defines a comprehensive framework to protect government information, operations and assets against natural or man-made threats. FISMA was signed into law part of the Electronic Government Act of 2002.

The National Institute of Standards and Technology (NIST) outlines nine steps toward compliance with FISMA:

– Categorize the information to be protected
– Select minimum baseline controls
– Refine controls using a risk assessment procedure
– Document the controls in the system security plan
– Implement security controls in appropriate information systems
– Assess the effectiveness of the security controls once they have been implemented
– Determine agency-level risk to the mission or business case
– Authorize the information system for processing
– Monitor the security

Our Clients


Blizzard Entertainment“RampRate has been my most reliable global resource and is ready to perform for us at a moment’s notice. Their inside knowledge and ability to handle high-level complex negotiations helped us move fast! They made scaling easier.”

Paul Sams, COO, Blizzard Entertainment

 Phil Wiser, CTO Hearst, formerly of Sony and Liquid Audio“For over a dozen years, RampRate helped my companies understand the differences between suppliers and worked with us to create the methodology, define the metrics and utilize the proper QoS tools needed to choose the supplier best suited to our needs or restructuring through tailoring solutions. RampRate knows this business better than anyone. We literally saved months of time and optimized our infrastructure spend time and time again. They saved us millions, created agility and new budget out of thin air.” We use them to source or renegotiate cloud, CDN, data center, telecom, software, and strategic initiatives.

Phil Wiser, CTO Hearst, formerly of Sony and Liquid Audio

eBay“I knew I was leaving a bit on the table in our outsourced contracts. But the corporate mandate is growth and innovation, and when further contract improvement seemed to be marginal, my team’s first priorities had to move elsewhere. We can count on RampRate to be precise, timely and create millions in value.”

Dean Nelson, Vice President of Global Foundation Services, eBay

Accenture“I have had the pleasure of working with the crew at RampRate several times. Each time they have saved significant time in negotiating and closing contracts for data center space, telecom and managed services, which provided at least 20% savings over what we could have done alone and certainly cut processes in half. Tony and team are extremely knowledgeable in this space and always bring innovation and out-of-the-box thinking to the table.” 

Michael Montalto, Accenture

Featured Work


From Supply Chain to the Blockchain: Heal the Body, Mind, & Earth

Supply Chain to the Blockchain
18 years ago, I got into IT sourcing not to make a buck, but to fix the wrongs that I saw in building the backbone of the internet in the 90s. The world of large technology deals was (and, let’s face it, decades later still is) full of FUD, price discrimination, poor decisions, and outright corruption. Read more

Contact Us

We would be happy to share with you our experiences and help you understand
the potential opportunities involved in achieving your goals.

Get in Touch