equipment is collocated in facilities with 24-hour
physical security, redundant electrical supply,
redundant data center air conditioners and other
back-up equipment designed to keep servers continually
up and running.
use the strongest encryption products to protect
customer data and communications, including 128-bit
SSL Certification and RSA based public keys where
available. When you look at the bottom of your Browser
you will see the lock icon which indicates that data
is fully shielded from access.
& User security
can only access zCRM applications with a valid
username and password, which is encrypted via 128-bit
SSL while in transmission.
application has built in security to prevent one zCRM
customer from accessing another's data. The same
security system prevents people within the same
company looking at data there're not supposed to.
of the perimeter firewalls, systems are safeguarded by
sophisticated networking configurations that include;
address translation, port redirection, non-routable IP
addressing schemes, and other world class
enforce tight operating system-level security by using
a minimal number of entry points to our powerful
server farm. We protect all operating system accounts
with strong passwords and servers do not share a
data entered into an zCRM application by a customer is
owned by that customer. Our employees do not have
direct access to our server farm, except where
necessary for system management, maintenance,
monitoring, and backups. Our own Technical Services
Group provides all system management, maintenance,
monitoring, and backups. We restrict 3rd party
involvement to a minimum.
server farm is configured in a redundant
configuration, so that no one single point of failure
exists. All customer data is stored on a primary
database server that is clustered with a backup
database server for redundancy. All customer data is
stored on disk storage that is mirrored across
different storage drives. The configuration is
designed to deliver 98.9% availability - less than 20
minutes down time per week.
customer data is automatically backed up to a primary
tape library as determined by our customers. Backup
tapes are verified for their integrity, and moved to
secure off-site storage on a regular basis. Disaster
recovery plans are in place.