LEARN HOW WE WORK
With fully-redundant and geographically separated data centers and multiple, high-capacity, domestic contact centers, Ceannate companies boasts a 99.99% uptime percentage—that means we’re always there for our clients and their stakeholders. Ceannate companies operate from one of the most sophisticated and secure infrastructures in the accounts receivable management (ARM) industry. Our infrastructure is designed to handle a large volume of referrals in a highly secure environment. In a world of “fraud without borders” and sophisticated hacking tools, we have built a total enterprise systems package capable of managing a varied set of public and private sector portfolios without sacrificing performance or security. Our infrastructure design is based on, and continues to be guided by, the following concepts:
We’re always there for our clients and their stakeholders.
Our infrastructure is characterized by the following technological features:
COLLOCATED DATA CENTERS
We operate primary and secondary collocated Tier 3 data centers with geographic separation for optimum physical and environmental security controls.
We have achieved complete redundancy of all mission critical systems through the implementation of twin configurations in both the primary and secondary data centers.
We have achieved complete protection of data availability and integrity through the use of the following technologies:
Storage Area Network including full data replication from the Primary Collocated Data Center to the Secondary Collocated Data Center.
Recover technology that provides industry-leading Recovery Time (RTO) and Recovery Point (RPO) Objectives.
De-duplication technology as well as a Disk-to-Disk-to-Tape data backup methodology, which streamlines the data backup process, provides quicker and more reliable data restores, and minimizes the expense of tape technologies as well as the environmental impacts of plastic and magnetic media.
System redundancy at all levels including WAN connectivity, Internet connectivity, firewalls, routers, switches, and servers.
THIN CLIENT COMPUTING
We use a Thin Client computing environment in conjunction with terminal servers running on virtualized blade servers. This environment not only increases the level of information security, but also greatly reduces the harmful impacts of data centers on the environment in the form of electrical and cooling needs.
VOICE OVER IP (VOIP)
Our VOIP telephony system provides flexibility, cost efficiency, and interoperability.
We operate within a fully blended inbound-outbound environment supported by a predictive dialer platform resulting in best-in-class contact rates, advanced IVR capabilities, and virtually limitless capacity for workflow customization.
Privacy, Security, and Compliance
Our Information Security Program covers the entire range of security requirements, from payment processing and accounting practices to student privacy protection at the record level. Each and every process and entity is managed actively within our technology architecture.
We adhere to over 600 separate security controls across FISMA, PCI-DSS, SSAE 18 SOC II, and ISO 17799 / 27001 / 27002. Our security controls are assessed annually by certified independent assessors to ensure that we remain in compliance with all relevant standards:
The Federal Information Security Management Act
Ensures the confidentiality, availability, and integrity of federal information and information systems through adherence to security configuration standards developed and maintained by the National Institute of Standards and Technology (NIST) including Continuous Security Assessment requirements that demand a continuous monitoring program (as opposed to purely annual assessments)
The Payment Card Industry Data Security Standard
Enhances payment account data security through consistent security management, policies, procedures, network architecture, software design, and other critical protective measures
International Organization for Standardization
Ensures an effective, global information security management plan through compliance with hundreds of controls and control mechanisms determined via formal risk assessments specific to our business
Statement on Standards for Attestation Engagements No. 18
Ensures our compliance as a service organization across control environments, control activities, information and communication processes, risk assessments, and monitoring per the Auditing Standards Board (ASB) of the American Institute of Certified Public Accountants (AICPA)
The Family Educational Rights and Privacy Act
Ensures the protection of student privacy rights and student personally identifiable information in compliance with Federal law