Security and Dependability

With more than 30 years’ experience in financial printing, Command recognizes the need for rigorous data security and dependability. Our efforts to effectively meet these requirements encompass our technological infrastructure, best practices geared toward providing the highest levels of data security, and maintaining best-in-class disaster recovery and business continuity. It should be noted that throughout our 30+ year operating history we have never had a security breach, violation of client confidential information, or a significant interruption of services.

Our computer systems utilize secure dedicated lines and servers, redundant systems to monitor and authenticate network access, and backup procedures that mirror and retain working copies of all projects. Data is stored on redundant hosts, replicated to alternate sites, and backed up regularly.

Disaster Recovery and Business Continuity

Command has contracted with TierPoint to help us meet our clients’ ever-increasing requirements related to data security. Every TierPoint data center maintains compliance certifications, attestations, and registrations including ISO 27001, SOC 1 Type II & SOC 2 Type II.


Our network systems are evaluated and tested on a regular basis by independent, third party auditors. Further, Command employs the latest technologies to monitor potential security threats with active and live monitoring tools to minimize threat potentials.

With regard to our staff, Command’s employees are vetted through a series of background checks consistent with those performed by the clients we serve. Our employees receive regular security awareness training and adhere to our best-in-class policies regarding confidentiality and information security.

Contact us to learn more about our data and infrastructure security.