Security
We understand that businesses are exposed to a range of security risks inherent with information technology systems. With this in mind, we take extensive risk management measures to anticipate vulnerabilities, develop appropriate technology policies and deploy technology.
For example, our team adheres to strict security policies on a day-to-day basis, performs ongoing security and awareness training, implements enterprise-level security infrastructure components and receives both internal assessments and third-party audits.
Our team also goes to great lengths to prepare for natural and manmade disasters to help keep your data safe. Fault tolerance, system redundancy and site redundancy are just a few methods we use to protect ourselves against disasters.
Physical Security
Our data servers are housed at the FIBERTOWN Tier IV Data Center, a facility located in Bryan, Texas. The SAS 70 Type II compliant facility is armed with 24/7 security personnel, biometric and card key access control, and video surveillance.
Operational Security
We use advanced security methodology to protect your data, including:
- Penetration testing
- Application profiling
- Dynamic testing
- Vulnerability scans
Application Security
User access is only available with a valid email user name and password, which are both encrypted via Transport Layer Security (TLS) during transmission. All data is also protected with end-to-end TLS encryption.
Data Management
Insperity servers are housed at the FIBERTOWN Tier IV Data Center, a facility located in Bryan, TX.
Site Redundancy
Disasters such as tornados, hurricanes, or floods have a potential to destroy an entire facility. In the unlikely event that one of these should occur, we have constructed a redundant site at a remote and secure location that houses redundant copies of all of our critical systems.
System Redundancy
Occasionally, a machine or device will fail. We practice data center redundancy techniques at all of our facilities to protect from any data loss in case of failure, which includes data mirroring, disaster recovery and failover.
Redundant components are used within individual hardware devices to protect both our primary processing facility and our redundant site.
Offsite Hot Backups
“Hot backups” provide the ability to restore data rapidly and reliably. Backups are stored immediately to our redundant site, which is a secure location that can endure nearly any environmental condition.
Availability
We have consistently delivered 99.9% reliability to our clients since our inception by maximizing application availability with multiple data centers.
Our systems are protected by emergency generators (configured as N + 1) that provide backup power, and interruptible power systems (UPSs) are provisioned as 2N.
Concurrently-maintainable 2N cooling is configured to allow for proper heat dissipation, permitting sites to operate within an acceptable temperature range.
Additionally, automatic fire suppression systems are used for fire protection.