Data Security and Compliance
A trusted partner in cybersecurity and risk mitigation.
Overview
Committed to exceeding privacy, data security, and compliance expectations.
Protecting the data entrusted to us by our customers is of the utmost importance to AGS Health. We are committed to the highest standards of governance and information security for data and protected health information (PHI).
Modeled after the U.S. Department of Health and Human Services Office of Inspector General’s Compliance program, our practices ensure the highest levels of compliance with industry regulations. We conduct detailed risk analyses to identify and implement continuous improvements, and our risk mitigation efforts continually evolve to stay ahead of the latest cybersecurity threats and meet rigorous standards for data protection. Our commitment has been repeatedly demonstrated through our Cybersecurity Transparent designation by Censinet and KLAS Research, the DSCI Excellence Award, and the earned trust of our customers.
FEATURES AND CAPABILITIES
Information Security Controls
AGS Health’s IT infrastructure combines advanced cloud technologies, rigorous access controls, and proactive monitoring to ensure data is protected, systems remain resilient, and access is always secure.
Always On, Always Available
Redundant cloud hosting keeps critical systems online without disruption.
Faster, Safer Connections
A dedicated private cloud network ensures quick, secure, and reliable access to your data.
Threats Stopped Before They Spread
Proactive monitoring and anomaly detection tools safeguard against cyber risks.
Access Only Where Needed
Role-based privilege access managed through Privilege Access Management (PAM) tool.
Stronger Passwords, Stronger Protection
Enforced complexity, regular updates, and lockout policies prevent unauthorized access.
Our network security approach stops threats before they reach your systems, ensuring that team members, whether in the office or remote, always connect securely and efficiently.
Proactive Threat Detection
All inbound and outbound network traffic is inspected through firewalls. Security services include IPS, antivirus, antispyware, URL filtering, ATP, and geofencing.
Secure Anywhere Access
Remote workers have a secure, always-on connection to company systems with extra login protection, so threats are blocked and access is controlled wherever they work.
Email Threat Prevention
Email security solution to prevent advanced attacks and zero-day threats.
Network Segmentation
Separate public and private networks to minimize risk.
Proactive Perimeter Defense
“Deny-by-default” firewall policy to block unauthorized access.
20/6 Expert Oversight
Our centralized Network Operations Center ensures continuous monitoring and rapid response.
Network Access Control (NAC)
NAC provides secure access to endpoints and prevents unauthorized devices from connecting to the network.
We secure sensitive data wherever it resides or travels, so it stays safe from threats, compliant with regulations, and fully under your control.
Strong Encryption
Encryption for data at rest and data in transit.
Comprehensive Endpoint Protection
Endpoint detection and response security software with removable media device control deployed across all devices to detect and stop threats in real time.
Always Up to Date
Centralized patch management software ensures every system is current and secure.
Mobile Device Safeguards
Data loss prevention and encryption tools protect roaming laptops.
Data Storage Restriction
Restriction enabled to block data storage on user endpoints to protect sensitive information.
Secure File Transfers
Secure file transfer protocol (SFTP) ensures encrypted, compliant exchange of files.
Email Data Loss Prevention
Policies prevent sensitive data from leaving via email.
Our information security framework blends constant monitoring, rigorous testing, and recognized certifications to deliver unmatched protection and resilience.
24/7 Security Operations Center (SOC) Monitoring
Our SOC provides 24/7 Security Information and Event Management (SIEM) monitoring for critical infrastructure with threat intelligence and threat hunting.
Independent Assessments
Regular internal vulnerability assessment and penetration testing (VAPT), third-party assessments, and red teaming to uncover and address vulnerabilities.
Empowered Teams
Ongoing cybersecurity awareness training, phishing simulations, and targeted education sessions.
Proactive Risk Management
Enterprise and vendor risk assessments to maintain a secure supply chain.
Cyber Resilience and Recovery
- Business Continuity plan (BCP): BCP simulation tests to ensure operational resilience.
- Incident Response and recovery: Documented response plans with regular simulation drills for swift, effective action.
Certified Security Excellence
ISO 27001:2022 certified and SOC 2 Type 2 controls independently assessed by KPMG.
Our security extends beyond software technology with rigorous physical safeguards to ensure compliance, safety, and trust at every level.
Controlled Workspaces
Secure, access-controlled facilities featuring physical segregation, anti-passback systems, continuous CCTV coverage, and 24/7 on-site protection.
Comprehensive Safety Measures
Fire alarms, extinguishers, sprinklers, and visitor management systems to protect people and assets.
We safeguard more than systems with disciplined HR practices and robust vendor agreements that ensure all team members and partners uphold the highest security and compliance standards.
Secure Workforce Practices
Employee non-disclosure agreements (NDAs) signed at hiring and thorough background checks, including OIG/SAM database exclusion screening.
Continuous Security Awareness
Mandatory training at hire and annual refreshers covering information security, HIPAA, FWA, and cybersecurity best practices.
Trusted Partnerships
Business associate agreements (BAA) with vendor partners to uphold strict information security protocols.
From design to deployment, our application security practices ensure that every tool we develop or use is resilient against threats and compliant with the highest security standards.
Secure Hosting
All software applications are cloud-hosted for robust availability and protection.
Ongoing Security Testing
Regular internal and external application security assessments to identify and mitigate vulnerabilities.
Secure Application Development Practices
- Secure coding standards aligned with OWASP guidelines to prevent common application threats.
- Software development lifecycle (SDLC) assessed and certified for ISO/IEC 27001:2022 compliance.
Certifications and Attestations
SSAE 18 SOC 2 Type 2 Audit + HIPAA
connect with us
For more information on AGS Health’s data security and compliance practices, please contact us today.