Our main cluster applications are hosted on AWS West Region.
All traffic is encrypted through HTTPS.
We take dat privacy very seriously. We utilize PII restrictions and we control data access with privacy rule definitions. Confidential data is only accessible to those who need to have access.
We utilize the following:- SSL/TLS Certificates- Distributed Denial of Service (DDoS) Protection
We take the following steps during development to ensure data security and privacy:- Use of VPN/VPC for secure web interactions - OpenVPN- Internet Security & Firewall - Kaspersky internet security- Storage Encryption - personal computer HDD/SDD; cloud data