Physical Security
Our data center partner manages some of the most secure facilities available today in locations that are protected from physical and logical attacks as well as from natural disasters such as earthquakes, fires, floods, etc.
- 7x24x365 Security. The data centers that host our data is guarded seven days a week, 24 hours a day, each and every day of the year by private security guards.
- Video Monitoring. Each data center is monitored 7x24x365 with night vision cameras.
- Controlled Entrance. Access to our data center partner is tightly restricted to a small group of pre-authorized personnel.
- Biometric, two-Factor Authentication. Two forms of authentication, including a biometric one, must be used together at the same time to enter our data center partner data center.
- Undisclosed locations. Our data center partner servers are located inside generic-looking, undisclosed locations that make them less likely to be a target of an attack.
- Bullet-resistant walls. Our data center partner servers are guarded safely inside bullet-resistant walls.
Network Security
Our data center partner network security team and infrastructure helps protect data against the most sophisticated electronic attacks. The following is a subset of our network security practices. These are intentionally stated in a very general way, since even knowing what tactics we use is something hackers crave. If your organization requires further detail on our network security, please contact us.
- Secure Communication. All data transmission are encrypted using TLS 1.2 protocols, and we use certificates issued by SHA 256 based CA ensuring that our users have a secure connection from their browsers to our service. We use the latest and strong ciphers like AES_CBC/AES_GCM 256 bit/128 bit keys for encryption, SHA2 for message authentication and ECDHE_RSA as the key exchange mechanism.
- IDS/IPS. Our data center partner's network is gated and screened by highly powerful and certified Intrusion Detection / Intrusion Prevention Systems.
- Control and Audit. Our data center partner's accesses are controlled and also audited.
- Secured / Sliced Down OS. Our data center partner's applications run inside a secured, sliced-down operating system engineered for security that minimizes vulnerabilities.
- Virus Scanning. Traffic coming into our data center partner's servers are automatically scanned for harmful viruses using state of the art virus scanning protocols which are updated regularly.
NOTE: Withey Consulting Group routinely reviews all available audits performed by our data center partner to ensure compliance. We maintain records of our reviews and any correspondence regarding questions pertaining to our reviews.