Systems & Data SecurityAt EazyStock, we understand that the confidentiality, integrity, and availability of our customers’ information are vital to the success of their business operations. Our security platform uses a multi-layered approach to protect that key information.The system is constantly monitoring and we are always improving and upgrading our application, systems, and processes to meet the growing demands and challenges of security.Our service is collocated in dedicated spaces at top-tier data centers. These facilities provide support, including:Access Control and Physical Security24-hour security, including foot patrols and perimeter inspectionsDedicated Data Center rooms according to security class IIVideo surveillance throughout facility and perimeterBuilding engineered for local seismic, storm, and flood risksTracking of asset removalEnvironmental ControlsHumidity and temperature controlRedundant (N+1) cooling systemPowerUnderground utility power feedRedundant (N+1) CPS/UPS systemsRedundant power distribution units (PDUs)Redundant (N+1) diesel generators with on-site diesel fuel storageNetworkConcrete vaults for fiber entryRedundant internal networksMultiple redundant fiber connection routesHigh bandwidth capacityFire Detection and SuppressionVESDA (very early smoke detection apparatus), including arc flash protectionFire extinguishing using Inergen, multi-zoneSecure TransmissionsCommunication to and from Syncron is handled using protocols that enforce encryption, e.g. HTTPS, SFTP/FTPS or message queuesIngress filtering is possible for web access and file transfersNetwork ProtectionPerimeter firewalls and edge routers block unused protocolsInternal firewalls segregate traffic between the logical layers of the servicesA third-party service provider continuously scans the network externally and alerts changes in baseline configurationDisaster RecoveryData is transmitted across encrypted linksDisaster recovery tests verify our projected recovery times and the integrity of the customer dataBackupsDaily incremental backups, full backups once a weekLocal backups are continuously copied to the secondary data centerInternal and Third-Party Testing and AssessmentsSyncron tests all code for security vulnerabilities before release, and regularly scans our network and systems for vulnerabilities. Network and application vulnerability assessments are conducted regularlySecurity MonitoringOur information security department monitors notification from various sources and alerts from internal systems to identify and manage threatsAt the end of the day, you can rest assured your data is safe and secure with EazyStock. For more questions regarding our systems and data security please contact us.