|
|
|
Security |
Secure
We understand that your information is important. That’s why EmCentrix uses a
variety of methods to keep the information you put into the system secure.
Servers
EmCentrix’s servers are hosted by Latisys in a SAS 70 Type II certified facility. Latisys
provides an extensive set of security services based on the latest state-of-the-art
security technologies on the market. These security services are designed, deployed,
maintained and monitored 24x7x365 to provide the highest level enterprise security to
us on a contracted basis. In addition, Latisys is staffed by a certified security team to
ensure fast response to security incidents.
The facilities physical security measures include:
|
|
|
Onsite Security Personnel 24x7x365 |
|
|
Onsite 24x7x365 Network Operations Center, which monitors all external and
internal security |
|
|
Closed circuit television security system throughout the data center |
|
|
Combination proximity card and photo identification system required to gain
access to facility |
|
|
Single Point of Contact (SPOC) for each client to ensure only authorized
personnel has physical access to colocation space Not only do Latisys’
facilities help keep our servers secure, they also provide an ideal operating
environment for our servers, including: |
|
|
N+1 Cooling and Power Infrastructure |
|
|
Redundant, Blended Networks |
|
|
Ultra Sonic Humidification |
|
|
AC and DC Power Capability |
|
|
Advanced Fire Detection and Suppression Systems |
|
|
24x7x365 On-Site Technical Staff |
|
|
|
|
Firewall
EmCentrix uses Fortinet’s advanced FortiGate Antivirus Firewalls for Enterprise. FortiGate Antivirus Firewalls for Enterprise meets our enterprise-class requirement
for performance, availability and reliability. It includes all of the key capabilities
provided by other FortiGate models, with integrated, real-time antivirus, firewall,
VPN, network intrusion detection and prevention, and traffic-shaping services.
SSL
EmCentrix uses Secure Socket Layer (SSL) Certificates to encrypt your information
as it is transmitted over the Internet, ensuring that sensitive data remains private.
An SSL Certificate consists of a public key and a private key. The public key is used to encrypt information and the private key is used to decipher it. When a browser points to a secured domain, an SSL handshake authenticates the server and the client and establishes an encryption method and a unique session key. They can begin a secure session that guarantees message privacy and integrity.
Our system uses 128-bit to 256-bit encryption, the highest standard of security encryption normally available. Encryption strength is measured in key length — the number of bits in the key. To decipher an SSL communication, one needs to generate the correct decoding key. Mathematically speaking, 2n possible values exist for a key, where n is the number of bits. Thus, 40-bit encryption involves 240 possible values, 128-bit encryption involves 2128 combinations, and 256-bit keys involve a staggering 2256 possible combinations, rendering the encrypted data practically impervious to intrusion.
System Security
EmCentrix’s online human resources management system includes many security features designed to keep your company’s data secure. Below are some of the system’s important security features:
|
|
|
The system can be set to allow or deny access by IP addresses. When enabled, this setting lets you restrict access to the system only to a set of allowed IP addresses. |
|
|
Every user can be assigned a unique username and password. Entering the system requires three levels of authentication; users must provide a company ID, username, and password to log in. |
|
|
Passwords must contain a minimum of seven characters, including letters, numbers, and are case sensitive. Passwords can be set to expire, forcing users to change their passwords at set intervals. New users can be forced to change their password upon first login. |
|
|
The system can be set to lock user accounts after a certain number of failed login attempts. |
|
|
Employers and administrators can view a login tracking report, which displays a record of every login attempt, including the username, password, time, and IP address from which the login was attempted. Both failed and successful login attempts are recorded. |
|
|
A change report provides you with a real-time audit trail that updates as changes are made. The report includes not only the details of the change, but also the user account that made the change, a timestamp, and the IP address the change was made from. |
|
|
Terminated employees are automatically locked out of the system. Only active user accounts can access the system. |
|
|
Individual modules may be password protected in addition to the standard system login. |
|
|
|
|
|
 |
Request a Demo |
|
Let us show you how we can help your business. |
|
|
|
|
|
 |
Request a Quote |
|
Learn how affordable our solutions are for you. |
|
|
|
|
|
 |
Ask a Question |
|
|
Have a question that’s not answered on our website? |
|
|
|
|
|
|
 |
|
|
Why EmCentrix |
|
|
What makes EmCentrix different? |
|
|
|
|
|
|
|
|