Data Security

The Data Centre

Our online management system are located in Sydney inside a world class Equinix data centre which is managed by data centre professionals. The security system includes biometric scans, CCTV surveillance, 24x7 security guards, fire protection and full site audit log. The Data Centre is linked to major Tier-1 Australian Internet carriers and providers, with gigabit peering links to all the major Australian ISPs.

The Network

Our networking gear comes from Cisco and Juniper and has been set up in redundant active/standby configuration. Each server is connected to multiple redundant network switches, which in turn are connected to multiple redundant core and border routers to provide redundant connectivity all the way to the server level.

The Servers

Our servers are the high performance latest generation multi CPU, multi core Dell servers with multiple high speed hot-swappable SAS drives running in RAID configurations for the ultimate in reliability. They are equipped with redundant power supplies that are connected to independent primary and redundant power feeds. The power feeds are backed up by UPS and an on-site generator should the power supply from the grid be interrupted. To ensure maximum overall performance, each server is dedicated to an individual function (web, database, email, DNS, etc.) rather than being consolidated on a single machine.

Data Security

To ensure the security and privacy of your data we use four industry proven technologies;

  1. Secure Sockets Layer (SSL)
  2. Authentication
  3. Authorisation
  4. CAPTCHA (optional)

Secure Sockets Layer

The Secure Sockets Layer (SSL) is the most widely deployed security protocol used today. It is essentially a protocol that provides a secure channel between two machines operating over the Internet or an internal network. This is achieved by encrypting the data when it is sent from one machine and decrypting it when the other machine receives it. In today’s Internet focused world, the SSL protocol is typically used when a web browser needs to securely connect to a web server over the inherently insecure Internet.

SSL is a transparent protocol which requires little interaction from the end user when establishing a secure session. In the case of a browser for instance, users are alerted to the presence of SSL when the browser displays a padlock. This is the key to the success of SSL – it is an incredibly simple experience for end users.

Authentication

Authentication controls access to your web application via a username and password. If a user attempts to login with the wrong password the system will lock the account and the user will need to request their password to be reset. The username and password can be structured to meet your conventions and rules can be set to force password changes at regular intervals.

Authorisation

An authenticated user who has logged in to your system must also be authorised to access the data. This is managed by user being assigned to roles or user groups that limit them to the access required to complete their tasks. Role based permissions are used to control access to functions that create, read, update and delete data in your applications database tables. The users and roles are managed by an administrator who maintains the access privileges and reviews logs for attempted security breaches.

Captcha

A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a type of challenge-response test used in computing to determine whether or not the user is human. This adds an extra layer of security and can be used when being authenticated.

The most common type of CAPTCHA requires that the user type the letters and/or digits of a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen.

Data Backup

Off-server Backup is performed daily on files, databases, emails and system settings. Seven days of backup copies are kept on a separate backup server. This helps us restore your data in the unlikely event of the RAID drives ever failing. As an added advantage, you can call on our backup should you ever accidentally delete your files or database. More frequent backups can be arranged if you require a higher level of business assurance or greater peace of mind.

Data Centre Specifications

Power and Cooling

  • Average Power and Cooling Density 2.0 - 4.0 kVA per cabinet
  • Block redundant UPS - Redundancy N+1
  • Standby Power 3 x 3,000 kVA diesel generators - Redundancy N+1
  • Water-cooled centrifugal chillers and air handling units - Redundancy N+1

Security

  • Physical Man trap entry
  • Human Security officers 8am–5pm
  • Electronic Biometric Readers, CCTV and Recorders, Motion Detection

Fire Suppression

  • VESDA, smoke and heat detectors, double-interlocked pre-action sprinklers (dry pipe)

Certifications

  • SSAE 16/ISAE 3402 SOC 1 Type
  • ISO 27001
  • PCI-DSS

Green Design

  • Granular temperature monitoring
  • Optimized lighting controls