At Centerbase, we understand your responsibility to your clients to keep their personal information safe, secure, and confidential. With 100% incident-free experience hosting clients in our secure Cloud infrastructure, we create a safe environment for both you and your client’s information.
Centerbase Cloud Computing Platform:
The Centerbase cloud is built on industry-standard and trusted platforms that power much of the internet today. Our server hardware and firewalls are enterprise-class systems from Dell Computer. We run 24/7 high availability VMWARE clusters that allow us to keep your services up and running continuously. We constantly replicate our main site to our off-site disaster recovery location to allow for a quick transition in the unlikely event of a catastrophe in our main location. Our servers have resided in our current main facility without the need for a single failover. We have maintained a 99.999% uptime with an average of < 5 minutes of downtime per year.
Physical access to our facilities is incredibly secure, requiring passcards, ID cards, biometric eye scans, and pre-screening authorization to enter the building. Within the facility, an authorized 3rd party is required to physically unlock the cages where your information is located.
Owning our own infrastructure allows Centerbase some unique and valuable advantages over companies that host your services in 3rd party providers. Our team intimately knows the systems that make up our infrastructure. Hosting your data on 3rd party providers raises questions such as: How old are the servers? How many hours they have logged? Are upgrades and investments made regularly to ensure my data is protected by the up-to-date security measures? We manage our own internet border security, firewalls, and security policies and have over 16 years of incident-free experience. We design our systems to actively refuse connections from high-risk countries known for hacking activity. We also continuously monitor our systems for vulnerability and malicious activity in order to constantly stand vigilant against cyberattacks and DOS incidents.
Our data centers hold every conceivable certification for safety and security best practices. Our main data center:
- Boasts over 68,000 square feet of environmentally controlled, secure data center space.
- Has true 2N power and multi-homed connectivity from leading carriers.
- Offers 24 x 7 x 365 onsite personnel, biometric access, physical ID check, and more than I00 internal and external video cameras (with 90-day video storage).
- Maintains six (6) backup diesel generators on standby with an on-site fuel capacity of over 50,000 gallons, which are tested bi-weekly and routinely run at full load.
- Has superior connectivity through I5 on-net providers with access to 65 additional providers through layer 2 connectivity.
A Summary of Centerbase’s Security Practices
Centerbase owns and operates private servers in SSAE 16, SOC1&2, HIPAA Compliant ITAR, EUUS Privacy, GLBA, PCI Colo, and PCI Demarc certified data centers.
Protecting your data, both in transit and at rest in our database, is critical to your peace of mind. Centerbase employs industry-standard SHA256 4096 bit RSA encryption from your browser to our data center. This is the same secure transport used by banks, healthcare providers, and nearly all other secure internet services. In addition, we encrypt all backups of your data using 256-bit AES algorithms. Data Transmitted to our disaster recovery location facility is always encrypted during transport using AES-256 bit encryption over the wire. These measures help ensures that your data is safe at Centerbase.
Application Security, Audit, and Change Logs:
Centerbase contains a user-definable change tracking, audit log, and deletion log system. From an easy-to-use dashboard, you can quickly review all the activity by a user that is happening in the system. You can easily see what is changed. This log contains the name of the user, the exact item that is being changed, and the old and new values.
Application Security, Audit, and Change Logs: 3. In addition, you can see what items have been deleted from the system, and by whom. The system also provides a monitoring tool, so you can see who is logged in, and even log out users if needed remotely. Our advanced application-level security settings allow you to set permissions to any data in the system on a user or group policy basis. It’s easy to allow or restrict access to financial data, billing rates, sensitive documents, and cases to only those individuals that need access.
Our web server also logs and monitors every connection and communication that is made with your system. We store the IP address, what is being accessed, and the date and time of all interactions. This detailed level of logging allows you and us to understand exactly who is using and accessing your system at any time.
Uptime and Performance Monitoring
We keep a close eye on the performance and response time of your system. Offsite monitoring software constantly monitors our infrastructure for issues before they become failures. All client sites are part of a high availability group, so even a server hardware failure would mean only a few minutes of downtime while another server immediately picked up the workload for your site without loss of data. We also monitor each client’s website for response time to make sure you experience great performance. Our network operations center contains large displays to immediately indicate warning and issues visually to our team, who also monitor these operations on their individual workstations. Finally, our operations staff is notified via text and email when issues arise and are on call and available 24 x 7 x 365 to make sure your systems are up, running, and available to you. We understand there are no excuses if you have deadlines and court dates. Things need to work. All the time. No exception.