Security

World Class Security to Keep Your Data Safe

We know how important data safety and security is, and we take this responsibility very seriously.

Our data security approach
We undergo bi-annual SSAE 16 audits (formerly SAS 70) to ensure that your data is protected at all times.Our enterprise-grade firewalls and SSL encryption guarantee the highest levels of security, while permissions within our cloud software ensure that users can only access the data you want them to see.

SSAE 16 compliance

SSAE 16 is the de-facto industry certification for service providers in the United States, and examines both the design of our internal controls, as well as the effectiveness of those controls over a long period of time.

We undergo bi-annual SSAE 16 audits (formerly SAS 70) to ensure we have the proper controls and processes in place to deliver on our service commitment and keep your data safe.

Application security

We’ve implemented a number of controls within our applications to ensure all data remains fully secure including:

  • Secure Sockets Layers (SSL) to ensure all information sent between your computers and our host server is encrypted
  • User-authenticated and password-protected access to the application
  • Encrypted password with configurable length, compostion and experation
  • Automated idle user session timeout
  • Role-based user access to limit access to specific modules within the application
  • Separate database schema provided for individual customers

Network protection

To protect your data from outside threats, we have firewalls in place to separate our application network from outside traffic. In addition, anti-virus software detects and prevents transmission of data or files that contain certain virus signatures.

Disaster recovery

Detailed disaster recovery procedures ensure you can always access your data — even if a service location becomes inoperable. They include:

  • Identical facilities
  • Mirrored transactions
  • Automatic fail over
  • Daily and weekly system backups (scheduled and incremental)
  • Regularly scheduled tests to ensure recoverability of all backup data

 

Physical security

All of our data centers are fully secure, ensuring only authorized personnel can access them. Electronic key card and biometric scanning are in place, as well as digital surveillance to track and record all activities. Each location is monitored 24 hours per day, 7 days per week by onsite security staff and/or alarms, to prevent unauthorized entry and alert local police of intruders.

Environmental controls

All hardware in our data centers is fully protected with multiple heating, ventilation and air-conditioning (HVAC) units to regulate temperature and humidity. Servers are housed on racks to minimize impact of localized flooding.

Power

We ensure continuous uptime with redundant power supplies, which use a combination of uninterrupted power supply (UPS), generators or battery backup.

“A major advantage in using a cloud-based solution is that when auditors check our records, we can rest assured that we have identified any inaccuracies instantly so that we present a clear audit trail of where time has been spent. We are always able to know and show where the money goes and comply with the funding requirements of each and every research contract.”
Sally Scott
Head of Finance and Administration
Learn more about our products

Take a peek at the products we offer. They're safe & secure, we promise.

View Products
Ready to take the next step?

See how you can get started with Replicon today!

Get Started