This is one of our favorite pages because it reflects what customers are curious about. If you have a question you don’t see answered here please do drop us a line by clicking on the “Contact Support” button on the left
We chose to utilize Open-Source products for several reasons. First, the security protocols are incredibly well validated and have been utilized in thousands of products. Second, there is no proprietary application that locks your data into using ONLY their app to access YOUR data. Third, by utilizing (and supporting!) the Open-Source ecosystem we get a better product for everyone and hundreds of people working on the problems when they arise. This also allows us to offer our products at a substantial savings as we don’t have to pay for the application that hosts your data.
Privacy is something that is quickly slipping away in a world where Google, Microsoft, Amazon and all the other big data companies are harvesting your data to advertise to you and train their latest Artificial Intelligence (AI) offerings. In short- even if you pay for a service- your data isn’t yours. Our solution runs completely contrarian to the “big box” offerings making sure that your data remains yours. You control the data, you control access, we provide the infrastructure to make it happen!
We will have shortly for our simple backup line but ALL of our solutions are custom configured. ALL of our product offerings are all containerized and segmented from other customers. There are no “canned” environments because each customer gets to choose their own level of security and in some cases who the Administrator for the account is. While this sounds expensive we actually average about 20% less than our competitors for their offerings. Unless the environment you are choosing is highly complex we can turn around an order in less than 24 hours and you are ready to go regardless of skill set or product chosen!
All our data is hosted in a SOC2 Type 2 certified facility that requires multiple forms of authentication (including biometrics) and a man-trap for anyone trying to access the facility. Every single server backs up nightly to a physical and geographically to a separate server and all data is secured via client encryption and server encryption. No one can access the data on the drives from a physical or logical aspect even if they stole the server and if someone stole the server we would restore from a backup on any off-the-shelf server and have you working within a few hours.
The Zero Knowledge Protocol puts the ability to encrypt the data of the originator in a way that no one else can access it without the decryption keys that they share with others. Want to keep using DropBox or AWS or OneDrive without them being able to ready your files? Encrypt them first. Our motto is “Keep Your Data Yours” and we live and breathe it.
Boy is it ever! All of our customer data (regardless of product) is kept in its own “container” that is encrypted by the host server and then the customer app adds another layer of encryption on top of that. All data that is sent or received (“data in transit”) is sent over an encrypted channel (SSL, TLS1.2 or SSH) to ensure that at no time is any data is sent, received or stored unencrypted. This is also the reason that no employee of [company] can at any time access your data as we do NOT have your encryption keys.
Just the opposite. We built the most open, collaborative and secure platform we could starting with the most vetted security protocols and applications with a focus on privacy and keeping your data YOURS. We custom build our servers and storage network to meet the needs of hosting encrypted data in a high availability, highly secure environment. Any customer willing to sign a Non-Disclosure Agreement (NDA) will gain access to our architecture and technologies used.
Our platforms meet or exceed the following data storage and access standards: FIPS 140-3, NIST 800-209, HIPAA, PCI and section 17 of SEC (FINRA) security requirements. And before you ask, yes, all of our Engineers worked for the government in IA (Information Assurance) for a number of years and yes, we argue constantly about the best way to secure the platfroms.