99.99% Uptime From Last 15 YearsView Live Statistics
Security and Availability
At Celoxis, keeping your data safe and secure is an important part of our business. We understand that our reputation is at stake and do everything possible in respecting and protecting you and your data.
Access to servers
Our servers are hosted in Amazon Web Services (AWS) Cloud Infrastructure in the United States. AWS provides an advanced set of access, encryption, and logging features.
As computing power increases, it is of foremost importance to ensure that our application is not compromised by hackers with sophisticated processing capabilities. Access to our application is only via the latest 2048-bit industrial grade SSL certificates.
AWS’ security features include built-in firewalls, in-transit encryption, and connectivity options enabling dedicated or private connections from any environment. Our applications run on Ubuntu Linux that makes them inherently less vulnerable to viruses or malwares.
All user passwords are one-way hashed and cannot be accessed by anyone. AWS manages, defines, and enforces user access policies with tools including multi-factor authentication and directory services. We also enforce strict user password policies to enhance data security. Only authorized support personnels are limited to access project data with prior customer authorization.
We know that downtime isn’t just bothersome, it is costly. Our services storage solutions are designed to deliver secure, scalable, and durable storage for businesses looking to achieve efficiency and scalability within their backup and recovery environment. We have invested significantly in a comprehensive failover and disaster recovery system to protect your data and ensure business continuity.
Data Center Security
The AWS Cloud infrastructure consists of one or more discrete data centers, each with redundant power, networking and connectivity, housed in separate facilities.Which are more highly available, fault tolerant and scalable than would be possible from a single data center.
Our database is based on multiple levels of security. These include network isolation, encryption at rest using 256 bit keys and encryption of data in transit using SSL. Data in the underlying storage is encrypted, as are the automated backups, snapshots, and replicas.
24 * 7 * 365 alert mechanisms
Our application is constantly monitored to proactively report any abnormal activities. Using internal and external probes, we ensure that any such occurrences are immediately escalated.
High Security Standards
Our data centers maintain certification with robust security standards, such as ISO 27001, SOC 1/2/3, HIPAA and PCI DSS Level 1.
Integrity of Data
Multiple layers of operational and physical security to ensure the integrity and safety of your data.
Our web servers are behind a Distributed Denial of Service (DDoS) protection service that safeguards our web applications and services.
Always-on detection and automatic inline mitigations minimize any application downtime and latency.
Backups & Security
Encrypted access, data, and backups. Daily backups in multiple geographical locations.
Monitoring by administrators and strict access control procedures such as proximity security badge access and digital video surveillance.
What is the disk space for?
The disk space is only for files uploaded into the application. The project data, which is part of the database, is not included in the file space and is not charged.
Do you offer SSL?
Yes. Access to our application is only via the latest 2048-bit industrial grade SSL certificates.
Where are your servers located?
Celoxis application is hosted in Amazon Web Services (AWS) Cloud Infrastructure in the United States.