The emPower Digital Boardroom Platform means Security

Security for the GGA emPower Platform begins with a trustworthy technology foundation. At no time does the emPower Platform reside on any device. Devices can be hacked, stolen, lost, or broken. GGA’s software and infrastructure are designed from the ground up to be secure and resilient to attack. emPower is a true cloud solution. It can be accessed on any device; your smartphone, tablet, laptop, or PC. The emPower platform resides on and is protected by Azure.

Shared Responsibility

GGA places a heavy emphasis on security, so teaming up with Azure was a no-brainer. Azure offers 3 tiers of protection: Infrastructure as a service (IaaS), Platform as a service (PaaS) and Software as a service (SaaS). The emPower Digital Boardroom Platform is SaaS that sits on Azure's PaaS, similar to Office 365.  

The best offense is a great defense. By creating a layered approach to cloud security, both in physical data centers and across services, Azure can slow down a cyber-attack. If one layer is breached, there is a back-up in place to prevent further exposure. This approach further protects GGA clients from having their information accessed from unauthorized sources.

layered image

Layered Approach

The layered approach can be illustrated as a set of 7 concentric rings. In almost all cases, data is what the attackers are after. Data is safe and secure in the center – with each ring adding an additional layer of security. 

1. Data it is both Azure and GGA’ responsibility to ensure confidentiality, integrity, and availability of the data.

2. Application - helps reduce the number of vulnerabilities introduced in code.

3. Compute - makes sure compute resources are safe and secure and that the necessary controls are in place.

4. Networking - reduces the possibility of lateral movement throughout your network.

5. Perimeter - used to protect from network-based attacks against your resources.

6. Identity and access - ensures identities are secure, access granted is only what is needed, and changes are logged.

7. Physical Security - ensures that other layers can't be bypassed, and loss or theft is handled appropriately.

Additional Information

For more information please visit: