Decorative Geometric Pattern

Security

Security


Confidentiality, Integrity, and Availability

Outscale understands that the confidentiality, integrity, and availability of your information is vital to your business operations. That’s where Outscale excels. You must have trust and confidence in your service provider, and Outscale takes this commitment very seriously.

Cloud security is a top priority for our company and is embedded within the Outscale culture. This extends to our products, approach to development, and cloud operations practices, to ensure your information remains your information. Founded in France, security and compliance has always been a foundation for everything we do. The European Union’s security and data requirements (including ISO/IEC 27001, Data Sovereignty and GDPR) are among some of the strictest in the world, and our products and services have been built from the ground up with these principles in mind.

DOWNLOAD THE ISO/IEC 27001 CERTIFICATE OF CONFORMITY


Post navigatio

Download the Security Fact Sheet
Performance

Performance

We allow you to customize your servers to best fit our needs. When it comes to building a Cloud computing infrastructure that meets your performance demands, we stand alone.
Scalability

Scalability

Consider Outscale your tailor-made Cloud Solution—an automated and scalable Cloud designed to support your complex IT projects while controlling your operational costs.
Security

Security

We offer a powerful and highly secure Cloud that meets the highest standard of safety and reliability of technical redundancy, at no additional cost.
Security


Security and Compliance

Security and compliance are shared responsibilities between Outscale and our customers. We clearly defined this shared approach to help relieve your operational burden. Outscale operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software, as well as the configuration of the Outscale-provided security group firewall. Customers should carefully consider the services they choose depending on the services used, the integration of those services into their IT environment, and applicable laws and regulations. The nature of this shared responsibility also provides the flexibility and customer control that permits the deployment.

Security Certifications

ITAR Registered & Compliant Seal
ISO 27001 Certified by Schellman Seal