We know that long term relationships are built on trust, and therefore we take our role in protecting your data extremely seriously. We have made – and continue to make – significant investments information security, service operations and scalable and resilient architecture in order to ensure the confidentiality, integrity and availability of our customers’ data.
Operations, Availability and Performance
BiZZdesign’s SaaS service is designed to support the availability and scalability required for business critical systems. To ensure we continuously meet this goal, we have utilize the following:
- Multiple leading edge data centers meeting the highest standards for physical security and fire suppression
- Redundant power supplies for all network and server infrastructure
- High bandwidth connections
- Secure infrastructure with failsafe firewalls, intrusion detection systems (IDS), Distributed Denial of Service (DDoS) protection and real time monitoring and alerting
- Automated DevOps deployment processes, all operated by full-time BiZZdesign employees
- Dynamic provisioning of redundant host instances
Information Security
The security of your data is paramount. We have deployed a wide range of controls and measures to manage risk, monitor, assess and respond to emerging threats and mitigate vulnerabilities. Our Information Security Management System (ISMS) utilizes best practices based on ISO 27001:2013. Some of the key measures we deploy include:
- Logically isolated customer-specific network regions ensuring separation of each customer’s data
- Data encryption in transit and at rest, using strong encryption methods
- Secure encryption key management, including allowing customers to use their own encryption keys if desired
- Access control based on user role and authentication, with integration to identity and directory services available (e.g. Active Directory)
- Secure service operations based on “least privilege” principles with operational access protected by multi-factor authentication and encrypted VPNs
- Active vulnerability management via infrastructure hardening, frequent software patch management and application code analysis within our software development life cycle (SDLC), using best practices such as the Open Web Application Security Project (OWASP)
- Regular penetration tests on our infrastructure and applications (including customer penetration tests with prior arrangement)
- Secure activity monitoring and logging for audit trail purposes
- Secure media disposal and no use of tapes or removable media in our SaaS service infrastructure
- Data return and secure destruction at contract end
Business Continuity and Disaster Recovery
BiZZdesign maintains comprehensive business continuity and disaster recovery plans in order to covers disasters that could impact an entire data centre, ensuring fast response and service recovery.
ALSO SEE: Road-Mapping Change