Hosted Enj solutions come with security to ensure that your data is never compromised. The security measures at BISIL include:
Experienced, professional engineers and security specialists dedicated to round-the-clock data and systems protection
Continuous deployment of proven, up-to-date security technologies
Ongoing evaluation of emerging security developments and threats
Redundancy throughout the online infrastructure
Commitment to a secure, scalable, private, collocated system where BISIL manages its computing infrastructure
Physical Security – Our production equipment is collocated in Conshohocken, PA at a facility that provides 24- hour physical security, identification systems, redundant electrical generators, data center air conditioners, and other backup equipment designed to keep servers continually up and running.
Perimeter Defense – The network perimeter is protected by firewalls and monitored by intrusion detection systems. BISIL monitors and analyzes firewall logs to proactively identify security threats.
Systems Security – Inside the perimeter firewalls, the systems are safeguarded by network address translation, port redirection, and other techniques. The specific details of these features are proprietary.
Operating System Security – BISIL enforces tight operating system-level security by minimizing the number of access points to its production servers. We protect operating system accounts with strong passwords, and production servers do not share a master password database. All operating systems are hardened by disabling and/or removing any unnecessary users, protocols, and processes.
Server Management Security – All data and documents entered into the BISIL solutions by its customers owned by that customer. BISIL employees do not have direct access to the production equipment, except where necessary for system management, maintenance, monitoring, and backups. BISIL does not utilize any managed service providers. The BISIL systems engineering team provides all system management, maintenance, monitoring, and backups.
Security Model – Our application security model prevents one customer from accessing another's data. This security model is reapplied with every solution and enforced for the entire duration of a user session.
User Authentication – Users access BISIL hosted solutions only with a valid username and password combination, which is encrypted via SSL while in transmission. An encrypted session ID cookie is used to uniquely identify each user.
Database Security – Whenever possible, database access is controlled at the operating system and database connection level for additional security. Access to production databases is restricted to a limited number of points, and production databases do not share a master password database.
Data Encryption – BISIL employed encryption products to protect customer data and communications, including 128-bit Verisign SSL Certification. The lock icon in the browser indicates that data is fully shielded from access while in transit.
Redundancies and Backup
Reliability and Backup – All networking and computing components have backup devices. All customer data is stored on RAID disks and multiple data paths. All customer data is automatically backed up to an on-site device on a nightly basis. Backups are then moved to secure, off-site storage on a regular basis.
Disaster Recovery – BISIL has an agreement in place with a third-party provider of availability services to provide access to a geographically remote disaster recovery facility — along with required hardware, software and Internet connectivity — in the event our production facilities were to be rendered unavailable.