ScaleMatrix data centers employ a number of unique security protocols and technologies which help our clients comply with the most stringent of regulatory requirements. Combine those features with 24/7/365 armed security and mature operational controls, and ScaleMatrix becomes a valuable asset and partner for clients in highly-regulated industries.
ScaleMatrix assists clients with meeting HIPAA, PCI-DSS, and GLB compliance regulations by providing documentation of the necessary infrastructure-related controls for those certifications.
Physical controls include:
- 24/7/365 Armed Security Teams
- Two Factor Authentication
- Biometric Identity Verification at the Equipment Rack Level
- Extensive Use of Video Surveillance Throughout Our Data Center Locations
Network and logical controls include:
- Multi-Factor Authentication
- Hardware and Software Firewalls
- Vulnerability Scans
- Anti-Virus and Anti-Spyware Protection
- Intrusion Detection and Prevention Services
- Industry Standard Use of IPSEC, VPN, and SSL Certificates.
If you have any questions about our Compliance Program, please send an email to
compliance@scalematrix.com.
ScaleMatrix provides you with the proper compliance documentation that you need.
SSAE16 reports are delivered in hard copy. Electronic summaries of the reports are available upon request. PCI DSS AoC, Trustwave Certificate, and SSL server tests results are delivered electronically.
Third party audits and security questionnaires, ScaleMatrix policies on specific topics, employee-required training, responsibility matrices for HIPAA and PCI compliance, as well as industry-specific training, including CMS required training, and verifications of eligibility such as U.S. Government OIG and SAM Exclusionary searches are provided upon request.

ScaleMatrix audited controls matrix maps to a number of additional industry and compliance standards:
- Food and Drug Administration (FDA)
- U.S.-EU Safe Harbor (European Commission’s Directive on Data Protection)
- Gramm-Leach-Bliley (GLBA)
- International Traffic in Arms Regulations (ITAR)
- Federal Information Security Management Act (FISMA)
Unless otherwise noted, clients are responsible for their own compliance controls above the hypervisor, i.e., within the virtualized layer where the operating systems, databases, applications and integrations points reside.