Security is our Core Competency
Learn more about Artisan Infrastructure security, compliance and privacy policies.
Our Commitment to Security
-
ISO/IEC 27001:2013 information security
Our program is aligned with international standards and tailored for our service provider partners.
-
Annual SOC2 type II audits
Providing assurance as to the suitability of the design and operating effectiveness of our controls.
-
Regulatory compliance
We enable our partners to achieve compliance with various regulatory requirements including HIPPA and PCI.
-
Full-time CISO
We employ a full-time CISO with experience in creating and leading security organizations for service providers.

DDoS Mitigation Services
Industry reports show distributed denial of service (“DDoS”) attacks have grown an astounding 132% compared to last year.
With this persistent threat to cyber-security growing every day, we have taken the responsibility to include DDoS mitigation services with all of our clouds - enabling you to focus on your business, not your cloud security. Cornerstone™ DDoS Mitigation Service is capable of defeating the world’s largest and most complex attacks, offering scale, speed, and success in providing a defense for our partners.
Philosophy Overview
Security is a Shared Responsibility
When a partner moves infrastructure and data to our platform, the responsibility for security becomes shared. Artisan is responsible for security of the underlying infrastructure and the partner is responsible for the security of their environments Maintaining a trusted relationship is paramount to our joint success.
Accountability and Integrity
Artisan demonstrates an ongoing commitment to information security through the establishment and operation of an information security and compliance program headed by a full-time Chief Information Security Officer (CISO) that reports directly to the CEO.
Security governance, risk management and compliance.
With Architect IT managers can define business continuity and availability service level targets for each business service and immediately identify non-compliant components of the infrastructure. Architect provides four service level tiers that users can customize to define their own targets, then assign each business service to the appropriate tier. Architect automatically reports on any gaps or misconfigurations of protection infrastructure. This lets IT know in advance if there are any gaps in the organization’s protection strategy that put the business at risk.
Security Best-Practice Checklist:
- + Philosophy
-
Philosophy Overview
Security at Artisan is built in, not bolted on. Bolting on security as an afterthought has left previous generations of technology vulnerable to malware attacks, advanced persistent threats and other breach tactics. Our philosophy is that security is an integral part of our business and that only by providing a secure platform can we enable not only our success but that of our partners.Security is a Shared Responsibility
When a partner moves infrastructure and data to our platform, the responsibility for security becomes shared. Artisan is responsible for security of the underlying infrastructure and the partner is responsible for the security of their environments Maintaining a trusted relationship is paramount to our joint success.
Accountability and Integrity
Artisan demonstrates an ongoing commitment to information security through the establishment and operation of an information security and compliance program headed by a full-time Chief Information Security Officer (CISO) that reports directly to the CEO.
Security governance, risk management and compliance.
With Architect IT managers can define business continuity and availability service level targets for each business service and immediately identify non-compliant components of the infrastructure. Architect provides four service level tiers that users can customize to define their own targets, then assign each business service to the appropriate tier. Architect automatically reports on any gaps or misconfigurations of protection infrastructure. This lets IT know in advance if there are any gaps in the organization’s protection strategy that put the business at risk.
- + Security At-a-Glance
-
Security Best-Practice Checklist: