Move to the CenturyLink Hybrid IT Platform with confidence.
CenturyLink's hybrid-IT approach combines our public and private cloud offerings with our managed services and more "traditional" IT services to create a hybrid platform capable of meeting a multitude of business needs.
With our “defense in depth" approach to security, we work to protect our customer environments with multiple security measures at every level – securing physical equipment, cloud resources, and customer data. Our cloud comes with an extensive permissions system extending to the group and individual VM levels ensure only authorized users can access and alter systems. And we’ve worked with the leading IT auditing firms to ensure our systems are ready to support most global organizations.
We provide customers with role-based access to their cloud environments. Users access the CenturyLink Cloud Control Portal with a username and password, or by Single Sign On through SAML. All actions performed by users through the Control Portal — such as provisioning servers, adding public IP addresses and powering-on a cloud server — are logged and auditable. These logs are never deleted, and customers can view access logs on an entity-by-entity basis.
CenturyLink establishes a robust digital perimeter around your cloud environment. Access to customer servers can only be done via a certificate-based VPN connection unless specific public ports have been explicitly opened up by the customer. Customers can extend to two-factor authentication via LDAP (Microsoft Active Directory or OpenLDAP on Linux) for additional security where needed.
Customer environments on the CenturyLink Cloud are protected by a series of redundant Juniper SRX firewalls employing Unified Threat Management (UTM) technology. Each customer service runs on its own private VLAN, and each virtual machine is isolated with zone-based firewalls. Customers can also use secure connections such as Persistent\User VPN, Direct Connection, or MPLS.
Our data center Intrusion Detection System (IDS) and Intrusion Detection and Protection System (IDP) products screen incoming traffic for potential attacks. This protection is available data center-wide, and is implicitly enabled. Read this KB article for more details on CenturyLink Cloud and IDS & IDP.
In addition to real-time monitoring and NOC support, we perform Nessus vulnerability scans upon request as a service task. Then, you can choose to work with us as part of a paid engagement to mitigate any vulnerabilities, or take action on their own. To make sure that cloud servers are regularly protected with the latest operating system patches, CenturyLink Cloud offers managed operating system capabilities that keep customer machines up-to-date with vendor updates.
Each CenturyLink Cloud node is housed within private, caged enclosures. Entry to the data center premises requires an electronic proximity key card. Data center facilities are staffed 24x7x365 and monitored by cameras. An electronic proximity card control portal, biometric scan, and onsite data center personnel provide additional security inside the facility. Only authorized staff are allowed access to the private cage enclosure and they access physical hosts via two factor VPN authentication (SSH or RDP Access with Local administrator/root account and password required). All access is logged in both the control panel and the ticketing system.
CenturyLink understands that compliance is essential. Our hybrid IT platform can work with you to create a variety of custom solutions that can adhere to the most stringent of compliance standards (HIPAA, SOC1, SOC2, SOC3, ISO, PCI, FERPA and COPPA.) Even if your solution doesn’t require regulatory compliance at this time, know that CenturyLink can scale with you and provide the protection and ease of mind when you do.
Servers need to be regularly patched to stay secure and remain compliant with the OS vendor requirements. This is particularly important for longstanding VMs that your business counts on to always be up and running without a hitch. CenturyLink offers Automatic Operating System Patching Management — or Patching-as-a-Service — that will automatically patch individual servers or Groups. You can enable the service through a Blueprint, script package, or an API. Once deployed, the service informs you when the patching begins and ends via email. You can also pull the list of patches applied via API to ensure that all critical patches have been installed on your servers. It’s a simple thing, with a big payoff in time savings and peace of mind. Learn more about Automated Patch Management.
Connect networks within a particular data center through the use of configurable firewall policies, and create firewall policies that connect different data centers.
Ensure maximum uptime and reliability, the CenturyLink Cloud offers a portfolio of cloud load balancers to meet the unique requirements of your apps.
A broad array of managed security options layered to defend Cloud/Hosting workloads.
Protect your data across the public internet with desktop virtual private network (VPN) software via a self-service, persistent network-to-network tunnel.
CenturyLink Named “Niche” player in the Gartner 2017 Magic Quadrant for Cloud IaaS.Get the Report
We’ve helped businesses like yours be more successful in the cloud.View Success Stories
Ready to talk pricing? Tell us about your project, and let our cloud experts put a proposal together for you.Request a Quote