Skip to main content
RegFox Security
Nathanael Merrill avatar
Written by Nathanael Merrill
Updated over 4 years ago

Our Security

You can be assured that our software is safe and secure, using the latest security and encryption technologies. Our software is protected by military grade encryption – the same level encryption used by major banks. All transactions are processed, transmitted, and stored securely on a PCI Compliant network where all your data is securely encrypted several times within our secure data center located in Las Vegas, Nevada – a SSAE-16 certified location. Our PCI Compliance is certified through ControlScan, and PDF certification can be provided upon request. Our server and software are equipped with industry leading techniques to detect, block, and diffuse attempts by spammers, hackers, and bots to interfere with our system. We also have a global monitoring system that monitors our uptime round the clock and gives us up-to-the-second details on server metrics, performance, and speed.

Our Data Center

Our state of the art servers are managed by Switch Communications, the region’s newest large scale data center and disaster recovery center which has been SAE -16 certified. The security at our data center is unrivaled. With a 10 foot razor fence, keycarded entry, and a security system that includes redundant security camera servers, biometric handprint scanning, and trained security guards, our colocation services are the safest in the country.

On Site Security

The facilities and their physical security systems were designed together to provide extremely hardened, state-of-the-art, secure facilities. From well defined perimeters consisting of signage, blast walls and gates, to clear avenues of approach and backup perimeter barriers, the first layer of physical security is considerable.

Exterior walls are constructed of either steel reinforced poured concrete or masonry reinforced beyond building code requirements. Entry points are kept to a minimum and each exterior door is reinforced, alarmed, access controlled and viewed by a dedicated fixed camera.

Exterior doors lead into specially engineered mantraps built over fire corridor wall construction. The mantrap is sheeted with 12 gauge steel and strapped by 1/4″ aluminum. All access points off the mantrap require additional biometric authentication of the card holder and are controlled via a 24/7 Security Officer and man-trap relay logic. And of course, each man-trap includes audio surveillance and fixed cameras viewing every door.

In addition, equipment being brought in and out of the facility is logged by security to estimate environmental and power needs. Equipment is dropped at a special receiving man-trap by the customer for delivery to their protected space. Within the data center, customers’ assets are protected by locked secure cabinets or cages and video surveillance. All assets entering or being removed from the building are logged by an onsite security guard. Our guards are armed and typically are off duty police officers with arrest powers. Our armed supervision of the data center makes us one of the most secure facilities in the world.

Our Backup System

Your data is very important to us. We have built a sophisticated backup system to run alongside our live servers to make sure every piece of data in our system is backed up every 15 minutes. As our system captures real time data, we set up database replication servers dedicated just for making backups. With replication, all changes to a database is replicated to one or more redundant servers. Typically, replication is used for distributing requests, but it’s also excellent for making frequent redundant backups.

In our replication routine, we created a mirroring process that would write all queries and requests into a binary file that would record every single new request and action. This binary file is the master link that allows our main production servers to continue to run at full speed all the time without ever having to go into backup mode and pause service. Our redundant servers, acting as a slave that references the binary file, updates itself in real time. As fast as the binary file is being written, a complete separate backup is happening simultaneously. This all happens off the main rack. This slave server also has its own redundancies and can be locked at any time to do a full backup on a remote drive if needed. We take full complete snapshots of the redundant servers every 15 minutes and are backed up separately.

To summarize, our production server is simultaneously writing to the database and to the binary file, which is giving orders to the redundant slave servers to maintain an exact replica of our data at all time – which is again backed up in its entirety every 15 minutes.

Did this answer your question?