SKYSITE infrastructure is protected using a variety of methods.
Access control: SKYSITE servers are hosted across multiple data centers with regular audits and 24×7 monitoring. Access to the production servers is restricted to authorized individuals only and limited to only those users with specific need.
Network security: We utilize industry standard network security techniques including firewalls, security monitoring, and intrusion detection systems to ensure only allowed traffic reaches our environment.
Fault tolerance: To ensure business continuity and 100% data integrity, critical applications are protected using hardware and software fault tolerant solutions. In the event of a master server failure, production is failed-over to secondary servers ensuring zero downtime.
Redundancy: Warm standby servers across regions and zones ensure a rapid failover to redundant environments in the event of a disaster in any zone or region in the cloud.
Availability: We provide customers a 99.9% uptime guarantee for real-time access to SKYSITE.
DoS and DDoS Protection: SKYSITE has always-on detection and automatic inline mitigations to minimize application downtime and latency, due to network and transport layer DDoS attacks.
Automated Vulnerability Detection: Security loopholes are scanned automatically including OWASP top 10 vulnerabilities.
Security Testing: We regularly test our infrastructure to uncover and patch vulnerabilities. We also work with third-party specialists to keep our environment safe. Potential security risks are assessed and fixed immediately upon discovery.
Multifactor Authentication: Wherever possible, SKYSITE utilizes Multifactor Authentication to production and security systems to maximize security.