The thought of a security breach of your store’s data is frightening. At Alert Tech, we go to great lengths to protect your data.
Alert Tech understands the importance of data security, which is why we only use storage providers who have proven track records. We opt to pay to work with the top providers, who team with us to keep data in the right hands.
Probably one of the most critical parts of data security is protecting information as it’s transmitted from one location to another. To do this, we employ bank-level AES (256-bit) session encryption and 2048 RSA private/public key exchange. This includes the following:
- Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
- Secure Shell (SSH) KeyBased Access
Other Security Measures
Data Segregation & Encryption
Encryption is a must for data protection, but we go above and beyond to continue to ensure your information is as secure as possible. This includes:
- Physically segregating the client servers from one another. If disaster strikes in one location, there’s another server in another location with a backup of the data.
- Segregating the data warehouse from the analytics server.
- Encrypting any snapshots taken of data while it is on the server.
We also employ stronger authentication to anyone accessing systems remotely. This two-factor authentication is an important requirement when handling our client’s private data. We elect to surpass standard strong passwords wherever possible.
We have a system in place to perform periodic audits, to ensure there is no unusual activity in the event logs, in API logs, or with user access rights. From rogue access points to social engineering ploys, we stay locked down through continued discipline and client vendor training.
Custom Client Requests
To ensure we align with existing client security, we also utilize VLAN, port forwarding, IP whitelisting and other measures.
What Does This All Mean?
The details of data security are quite technical, and this is only meant as a brief overview to demonstrate that we take extensive measures to secure your data. We’re proud of the fact that we’ve never had a security breach, and we’re aware of the need to continually improve our security measures.
Early in the pilot process, we ask to engage with client Information Technology (IT) and Information Security (IS) teams as soon as possible. We’re always prepared to be a great partner by sharing necessary details through security questionnaires and a few calls to get everyone on the same page. Nobody wants to be the weak link that caused a breach.
If you’re considering an Alert Tech pilot, we definitely expect to discuss data security in more detail. Please contact us.