We take security seriously

Everything we do is extremely secure. You will be holded by trusted hands.

Amazon Web Services (AWS) Infrastructure

AWS is available in multiple locations worldwide. These locations are composed of regions and Availability Zones. A region is a named set of AWS resources in the same separate geographic area. Each region has multiple, isolated locations known as Availability Zones. AWS enables the placement of resources, such as instances, and data in multiple locations.

EZDI’s resources are replicated across three (3) distinct regions. Each region is completely independent and is designed to be completely isolated from the other regions. This achieves the greatest possible fault tolerance and stability. Each Availability Zone is isolated, but the Availability Zones in a region are connected through low-latency links. Availability Zones are physically separated within a typical metropolitan region and are located in lower risk flood plains (specific flood zone categorization varies by region). In addition to utilizing discrete uninterruptible power supply (UPS) and onsite backup generators, they are each fed via different grids from independent utilities to further reduce single points of failure. Availability Zones are all redundantly connected to multiple tier-1 transit providers.


The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely.

AWS’s world-class, highly secure data centers utilize state-of-the art electronic surveillance and multi-factor access control systems. Data centers are staffed 24×7 by trained security guards, and access is authorized strictly on a least privileged basis. Environmental systems are designed to minimize the impact of disruptions to operations and multiple geographic regions and Availability Zones allow EZDI web products to remain resilient in the face of most failure modes, including natural disasters or system failures.

The AWS virtual infrastructure has been designed to provide optimum availability while ensuring complete customer privacy and segregation. For a complete list of all the security measures built into the core AWS cloud infrastructure, platforms, and services, please read our Overview of Security Processes whitepaper.


AWS Compliance enables EZDI to leverage the robust controls in place at AWS to maintain security and data protection. As we build systems on top of the AWS cloud infrastructure, the compliance responsibilities will be shared. The information provided by AWS Compliance will help you to understand AWS compliance posture and to assess ezDI’s compliance with your industry and/or government requirements.

The IT infrastructure that AWS provides is designed and managed in alignment with best security practices and a variety of IT security standards, including:

  • SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II)
  • SOC 2
  • SOC 3
  • PCI DSS Level 1
  • ISO 27001
  • ISO 9001
  • ITAR
  • FIPS 140-2

In addition, the flexibility and control that the AWS platform provides allows customers to deploy solutions that meet several industry-specific standards, including:

  • Cloud Security Alliance (CSA)
  • Motion Picture Association of America (MPAA)

For a complete list of all the security measures built into the core AWS cloud infrastructure, platforms, and services, Please read our Overview of Security Processes whitepaper.