This information is provided by the ProFusion cloud host and will be updated periodically.

Provider employs more than 500 full-time security and privacy professionals, who are part of our software engineering and operations division. Our team includes some of the world’s foremost experts in information, application and network security. This team is tasked with maintaining the company’s defense systems, developing security review processes, building security infrastructure and implementing Provider’s security policies. Provider’s dedicated security team actively scans for security threats using commercial and custom tools, penetration tests, quality assurance (QA) measures and software security reviews.
Members of the information security team review security plans for all networks, systems and services. They monitor for suspicious activity on Provider’s networks, address information security threats, perform routine security evaluations and audits, and engage outside experts to conduct regular security assessments.

An effective malware attack can lead to account compromise, data theft, and possibly additional access to a network. Provider takes these threats to its networks and its customers very seriously and uses a variety of methods to prevent, detect and eradicate malware. Provider makes use of multiple antivirus engines in servers and workstations to help identify malware that may be missed by antivirus signatures.

Provider’s security monitoring program is focused on information gathered from internal network traffic, employee actions on systems and outside knowledge of vulnerabilities. At many points across the global network, internal traffic is inspected for suspicious behavior, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of open-source and commercial tools for traffic capture and parsing. Network analysis is supplemented by examining system logs to identify unusual behavior, such as attempted access of customer data. Security engineers place standing search alerts on public data repositories to look for security incidents that might affect the company’s infrastructure. They actively review inbound security reports and monitor public mailing lists, blog posts, and wikis. Automated network analysis helps determine when an unknown threat may exist and escalates to security staff, and network analysis is supplemented by automated analysis of system logs.

Provider’s focus on security and protection of data is among their primary design criteria . Data center physical security features a layered security model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection. Data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders. Access logs, activity records, and camera footage are available in case an incident occurs. Data centers are also routinely patrolled by experienced security guards who have undergone rigorous background checks and training. As you get closer to the data center floor, security measures also increase. Access to the data center floor is only possible via a security corridor which implements multi-factor access control using security badges and biometrics. Only approved employees with specific roles may enter. Less than one percent of provider employees will ever set foot in one of the data centers.

To keep things running 24/7 and ensure uninterrupted services, Provider’s data centers feature redundant power systems and environmental controls. Every critical component has a primary and alternate power source, each with equal power. Diesel engine backup generators can provide enough emergency electrical power to run each data center at full capacity. Cooling systems maintain a constant operating temperature for servers and other hardware, reducing the risk of service outages. Fire detection and suppression equipment helps prevent damage to hardware. Heat, fire, and smoke detectors trigger audible and visible alarms in the affected zone, at security operations consoles, and at remote monitoring desks.