Security – Network Alliance


No matter which level of Network Alliance service you use, your data is secure.

Our Level 4 datacenter keeps all of your data safe and secure with full backup systems and multiple physical security layers in place. Even if your hardware is lost or stolen, your files are still safe from potential thieves.

Network Alliance stores all of your data in a remote Level 4 data center with full redundancy, ensuring top-of-the-line data storage integrity. Nothing, including power outages, drive failures, and natural disasters, will cause your data to be lost.

We use several layers of network hardware and software to prevent malicious traffic from making its way to our servers. An Intrusion Prevention and Detection system (IPS) tracks all incoming traffic and blocks known malicious IP addresses, as well as all traffic from specific regions considered to be high security risks. A Fortune 100-level, hardware-based firewall monitors traffic that’s been let through the IPS and filters any malicious traffic. Both IPS and firewall firmware are updated constantly to thwart new attacks.


Our Mimecast spam filter is the best in the business. Phishing attacks are becoming commonplace in today’s world, and no one is better at preventing these attacks than Mimecast. The mail filter, with link and attachment protection included in your monthly bill, provides you with an easy-to-use hub to see exactly what’s blocked and why.

Most small organizations simply can’t afford a top-tier network security system. A firewall alone can cost tens of thousands of dollars, along with servers, anti-virus software, and rental/maintenance costs. For a set monthly fee, your small business can take advantage of our Fortune-100 level security. Peace of mind at a reasonable monthly rate.

Join Network Alliance today and let us “Change the way you see IT!”



SOC for Service Organizations reports are designed to help organizations that provide services to other entities build trust and confidence in the service performed and controls related to the services through a report by an independent CPA. In an SOC 2 Type 1 audit, IT infrastructures are tested for confidentiality and privacy. These are important for organizational oversight, vendor management programs, and risk management processes. A clean SOC 2 Type 1 audit means the provider handles important and confidential information in the best possible manner.

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. Companies that deal with protected health information (PHI) must have physical, network, and process security measures in place and follow them to ensure HIPAA compliance. Covered entities (anyone providing treatment, payment, and operations in healthcare) and business associates (anyone who has access to patient information and provides support in treatment, payment, or operations) must meet HIPAA compliance.

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store, or transmit credit card information maintain a secure environment.


NIST SP800-171 or just 800-171 is a codification of the requirements that any non-federal computer system must follow to store, process, or transmit Controlled Unclassified Information (CUI) or provide security protection for such systems. This document is based on the Federal Information Security Management Act of 2002 (FISMA) moderate-level requirements.

Our Thought Leadership on Security

Customer Service: What You Get vs. What You Deserve

Oct 9, 2018

A recent T-Mobile commercial features Rainn Wilson (aka Dwight Schrute from The Office!) calling tech support. When he finally reaches...

Full article

The New

Oct 5, 2018

Welcome to our new website! Over our 21+ years, Network Alliance’s website look has changed, but our goal to “Change...

Full article

Keeping Your Mac Safe

Oct 3, 2018

Still think Macs are invulnerable to viruses and malware? Unfortunately, no matter what kind of device you’re on, you aren’t...

Full article