SuperCFO Business Intelligence ("BI") Tool: Security Practices, Policies & Infrastructure
We take security quite seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure. We accordingly only work with Business Partners that offer such high standards in data security. If you are currently maintaining your data & information on personal laptop/computers or your own servers, the odds are that our security will be better than what you currently have in place.
This document outlines some of the mechanisms and processes we have implemented to help ensure that your data is protected. Our security practices are grouped in four different areas: Physical Security; Network Security; People Processes and Redundancy and Business Continuity.
The datacenters that hosts your data is hosted in some of the most secured facilities available today in locations that are protected from physical and logical attacks as well as from natural disasters such as earthquakes, fires, floods, etc.
The data centers that host your data are guarded seven days a week, 24 hours a day, each and every day of the year by private security guards.
Each data center is monitored 7x24x365 with night vision cameras.
Access to these data centers is tightly restricted to a small group of pre-authorized personnel.
Biometric, two-Factor Authentication.
Two forms of authentication, including a biometric one, must be used together at the same time to enter these data center.
These data servers are located inside generic-looking, undisclosed locations that make them less likely to be a target of an attack.
The data servers are guarded safely inside bullet-resistant walls.
The network security team and infrastructure helps protect your data against the most sophisticated electronic attacks. The following is a subset of the network security practices. These are intentionally stated in a very general way, since even knowing what tactics are being used is something that hackers crave. If your organization requires further detail on network security, please contact us.
The communication between your computer and our servers is encrypted using strong 128-bit keys (256-bit keys in many cases). What this means is that even if the information traveling between your computer and our servers were to be intercepted, it would be nearly impossible for anyone to make any sense out of it. Please check our product pages for details on which applications or plans support SSL.
The network is gated and screened by highly powerful and certified Intrusion Detection / Intrusion Prevention Systems.
Control and Audit.
All accesses are controlled and also audited.
Secured / Sliced Down OS.
The application run inside a secured, sliced-down operating system engineered for security that minimizes vulnerabilities.
Traffic coming into Servers is automatically scanned for harmful viruses using state of the art virus scanning protocols which are updated regularly.
Designing and running data center infrastructure requires not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day to day operations. The security team has years of experience in designing and operating data centers and continually improves processes over time.
Redundancy and Business Continuity
One of the fundamental philosophies of cloud computing is the acknowledgment and assumption that computer resources will at some point fail. We work with partners who have designed systems and infrastructure with that in mind.
Distributed Grid Architecture.
The services run on distributed grid architecture. That means a server can fail without a noticeable impact on the system or services. In fact, on any given week, multiple servers could fail without the customers ever noticing it. The system has been designed knowing that server will eventually fail and hence the infrastructure has been setup to account for that.
Servers have been configured for power redundancy – from power supply to power delivery.
The platform is connected to the world –and you- through multiple Tier-1 ISPs. So if any one fails or experiences a delay, you can still reliably get to your applications and information.
Redundant Network Devices.
The platform runs on redundant network devices (switches, routers, security gateways) to avoid any single point of failure at any level on the internal network.
Redundant Cooling and Temperature.
Intense computing resources generate a lot of heat, and thus need to be cooled to guarantee a smooth operation. These servers are backed by N+2 redundant HVAC systems and temperature control systems.
Customer data is mirrored in a separate geographic location for Disaster Recovery and Business Continuity purposes. Please note geo mirroring is available only select plans.
The data centers are guarded by industry-standard fire prevention and control systems.
Data Protection & Back-up.
User data is backed-up periodically across multiple servers, helping protect the data in the event of hardware failure or disaster.
While we cannot list all the details of the infrastructure for security reasons, rest assured that SuperCFO’s security practices, policies and infrastructure are proven and reliable.
For more information about our Security please contact us.