99.99% Uptime From Last 15 Years

View Live Statistics

Security and Availability

At Celoxis, keeping your data safe and secure is an important part of our business. We understand that our reputation is at stake and do everything possible in respecting and protecting you and your data.


Access to servers

Our servers are hosted in Amazon Web Services (AWS) Cloud Infrastructure in the United States. AWS provides an advanced set of access, encryption, and logging features.

SSL

As computing power increases, it is of foremost importance to ensure that our application is not compromised by hackers with sophisticated processing capabilities. Access to our application is only via the latest 2048-bit industrial grade SSL certificates.

Firewalls

AWS’ security features include built-in firewalls, in-transit encryption, and connectivity options enabling dedicated or private connections from any environment. Our applications run on Ubuntu Linux that makes them inherently less vulnerable to viruses or malwares.

User Identification

All user passwords are one-way hashed and cannot be accessed by anyone. AWS manages, defines, and enforces user access policies with tools including multi-factor authentication and directory services. We also enforce strict user password policies to enhance data security. Only authorized support personnels are limited to access project data with prior customer authorization.

Disaster Recovery

We know that downtime isn’t just bothersome, it is costly. Our services storage solutions are designed to deliver secure, scalable, and durable storage for businesses looking to achieve efficiency and scalability within their backup and recovery environment. We have invested significantly in a comprehensive failover and disaster recovery system to protect your data and ensure business continuity.


Data Center Security

The AWS Cloud infrastructure consists of one or more discrete data centers, each with redundant power, networking and connectivity, housed in separate facilities.Which are more highly available, fault tolerant and scalable than would be possible from a single data center.

Database Security

Our database is based on multiple levels of security. These include network isolation, encryption at rest using 256 bit keys and encryption of data in transit using SSL. Data in the underlying storage is encrypted, as are the automated backups, snapshots, and replicas.

24 * 7 * 365 alert mechanisms

Our application is constantly monitored to proactively report any abnormal activities. Using internal and external probes, we ensure that any such occurrences are immediately escalated.

Amazon Web Services

World-class Data Centers


At Celoxis, keeping your data safe and secure is an important part of our business. We understand that our reputation is at stake and do everything possible in respecting and protecting you and your data.

High Security Standards

Our data centers maintain certification with robust security standards, such as ISO 27001, SOC 1/2/3, HIPAA and PCI DSS Level 1.

Integrity of Data

Multiple layers of operational and physical security to ensure the integrity and safety of your data.

No Attack

Our web servers are behind a Distributed Denial of Service (DDoS) protection service that safeguards our web applications and services.

No Downtime

Always-on detection and automatic inline mitigations minimize any application downtime and latency.

Backups & Security

Encrypted access, data, and backups. Daily backups in multiple geographical locations.

Access Control

Monitoring by administrators and strict access control procedures such as proximity security badge access and digital video surveillance.

Web Servers


Web servers are maintained in a high availability configuration. The health of the servers monitored, and unhealthy instances are terminated, and a replacement server is automatically brought up.
Our web servers are behind a Distributed Denial of Service (DDoS) protection service that safeguards our web applications. The service provides always-on detection and automatic inline mitigations that minimize application downtime and latency.
Volumes are automatically replicated in its data center to protect from component failure, offering high availability and durability. A live standby volume is asynchronously maintained in another data center to account for the primary data center failures.
Data-at-rest and data-in-transit between hosts and volumes are protected with 256-bit key encryption. All backups are also encrypted.

Regular Updates and Patch Management


In addition to AWS’ intrinsic security audits, we also regularly conduct internal network security audits and scanning. This enables us for quick identification of outdated systems and services. Whenever a vulnerability is publicly reported, prompt actions are taken in order to mitigate any potential risks for our customers — we apply hot fixes and patches promptly upon availability.

Frequently Asked Questions


Drop us an email if you couldn't find an answer to your question in the following list.

What is the disk space for?

The disk space is only for files uploaded into the application. The project data, which is part of the database, is not included in the file space and is not charged.

Do you offer SSL?

Yes. Access to our application is only via the latest 2048-bit industrial grade SSL certificates.

Where are your servers located?

Celoxis application is hosted in Amazon Web Services (AWS) Cloud Infrastructure in the United States.

2800+ companies worldwide trust Celoxis

Start your 30-day free trial