Anseris Reports Security and Infrastructure

 

This document outlines some of the mechanisms and processes we have implemented to help ensure that your data is protected. Our security practices are grouped in four different areas: Physical Security; Network Security; and Redundancy and Business Continuity.

Physical Security

Our datacenters are hosted in some of the most secure facilities available today in locations that are protected from physical and logical attacks as well as from natural disasters such as earthquakes, fires, floods, etc.

 

  • 7x24x365 Security. The data centers that host your data are guarded seven days a week, 24 hours a day, each and every day of the year by private security guards.

  • Video Monitoring. Each data center is monitored 7x24x365.

  • Biometric, two-Factor Authentication. Two forms of authentication, including a biometric one, must be used together at the same time to enter a data center.

  • Undisclosed locations. data servers are located inside generic-looking, undisclosed locations that make them less likely to be a target of an attack.

  • Bullet-resistant walls. data servers are guarded safely inside bullet-resistant walls.

 

Network Security

The following is a subset of our network security practices. These are intentionally stated in a very general way, since even knowing what tactics we use is something hackers crave.

 

  • 128/256-bit SSL. The communication between your computer and our servers is encrypted using strong 128-bit keys (256-bit keys in many cases). What this means is that even if the information traveling between your computer and our servers were to be intercepted, it would be nearly impossible for anyone to make any sense out of it.

  • IDS/IPS. Our network is gated and screened by highly powerful and certified Intrusion Detection / Intrusion Prevention Systems.

  • Control and Audit. All accesses are controlled and also audited.

  • Virus Scanning. Traffic coming into the data servers is automatically scanned for harmful viruses using state of the art virus scanning protocols which are updated regularly.

 

Redundancy and Business Continuity

 

  • Distributed Grid Architecture. Anseris Reports services run on a distributed grid architecture. That means a server can fail without a noticeable impact on the system or our services. In fact, on any given week, multiple servers fail without our customers ever noticing it. The system has been designed knowing that server will eventually fail - we have implemented our infrastructure to account for that.

  • Internet Redundancy. Anseris Reports is connected to the world –and you- through multiple Tier-1 ISPs. So if any one fails or experiences a delay, you can still reliably get to your applications and information.

  • Redundant Network Devices. Anseris Reports runs on redundant network devices (switches, routers, security gateways) to avoid any single point of failure at any level on the internal network.

 

For more information about Anseris Reports and our Security please contact us

© 2015 by Anseris, Inc.