USA and Canada

Promenics, Secure System - Reliable Services

Promenics has partnered with Rackspace, a leading IT infrastructure services provider, to deliver security infrastructure that ensures customer data is never compromised.

  World-class hosting partner

  • Promenics has partnered with Rackspace (www.rackspace.com), an award winning world's leading specialist in the hosting and cloud computing industry. Promenics manages the computer hardware, backups, releases, upgrades and database management, and Rackspace provides the environment, security, redundant power lines and high bandwidth solution access through the internet.

  • Rack space deliver enterprise-level hosting services around the world and serving more than 130,000 customers, including over 110,000 cloud computing customers.

 
 
 

   SAS 70 Type II Compliant data center

  • Our client's data is hosted in SAS 70 Type II compliant data center.

SAS No. 70 ("SAS 70 Audit") is widely recognized, because it represents that a service organization has been through an in-depth audit of their control objectives and control activities, which often include controls over information technology and related processes.  SAS No. 70 is the authoritative guidance that allows service organizations to disclose their control activities and processes to their customers and their customers' auditors in a uniform reporting format.

SAS No. 70 provides guidance to enable an independent auditor ("service auditor") to issue an opinion on a service organization's description of controls through a Service Auditor's Report (also known as a “Type II Report”).  The issuance of a service auditor's report prepared in accordance with SAS No. 70 signifies that a service organization has had its control objectives and control activities examined by an independent accounting and auditing firm.  The service auditor's report, which includes the service auditor's opinion is issued to the service organization at the conclusion of a SAS 70 examination.

  •  

  Hosted Architecture

  • Promenics Hosted Services are provided using our multi-tenant architecture optimized for delivery of software via the Software As A Service (“SaaS”) approach and is represented below:
 

  Data Security

  • Our distributed multi-tenant architecture is built to provide a higher level of security and reliability as compared to traditional single-tenant architecture. Individual user data is dispersed across a number of anonymous servers, clusters and data centers. This ensures data is not only safe from potential loss, but also highly secure.

  • Data is stored in encoded format, optimized for performance, rather than stored in a traditional file system or database manner. Specialized knowledge of data structure would be required to get meaningful access to data.

 
 
 

  Secure transmission of customer Data

  • Promenics uses the strongest encryption products to protect customer data and communications. The web interface to the system incorporate the Secure Socket Layer (SSL) protocols.

  • The purpose of this protocol is to provide security for the data by encrypting it as it transmitted between our application server and the browser hosted on user's workstations. During use, the lock icon in the browser indicates that data is fully shielded from access while in transit.

  • SSL is worldwide Web Standard for protecting critical data and is used by banks, brokerages and others to protect their clients' data.

  Prevention of Access of Customer Data

  • Promenics has partnered with Rackspace (www.rackspace.com), an award winning world's leading specialist in the hosting and cloud computing industry. Promenics manages the computer hardware, backups, releases, upgrades and database management, and Rackspace provides the environment, security, redundant power lines and high bandwidth solution access through the internet.

  • Rack space deliver enterprise-level hosting services around the world and serving more than 130,000 customers, including over 110,000 cloud computing customers.

 
 
 

  User Security

  • User ID and Password: Users access the system with a valid user name and password combination, which is encrypted via SSL for internet transmission. An encrypted session ID cookie is used to uniquely identify each user and after 60 minutes of inactivity, the session will time out and a new session must be established in order to access data. Each user is assigned a unique user ID and password. Upon first login, each user may then change his/her password. The password is also encrypted  and stored in the database. User ID is also used to map each user to their organization specific data.

  • User Access Control: Promenics System Administrator has the right to grant permission to access, view and interact. Only authorized System Administrator have access to all of the information in the system and full range of functions.

  • Role Based Access Control: Promenics has incorporated the concept of Role Based Access Control (RBAC) which allows System Administrator to grant permission to roles and assign roles to users. Permission include; add, update, view, delete etc. Each user is assigned one or more roles. Only those capabilities which have been granted to the specfic role are made available to users. Role include; System Administrator, HR Manager, Finance Manager, Payroll Accountant, Accounts Payable, Office Administrator to manage Petty cash, employees, secretaries (restricted view of boss page) etc. Users that have not been assigned specific roles are not aware that other capabilities even exist in the system.

  •  

  •  
 
 

  Physical Security

  • Access: Keycard protocols, biometric scanning protocols and round-the-clock interior and exterior surveillance monitor access to every one of our data centers.
    Only authorized data center personnel are granted access credentials to our data centers. No one else can enter the production area of the datacenter without prior clearance and an appropriate escort.
    Every data center employee undergoes multiple and thorough background security checks before they're hired.

  • Precision enviornment: Every data center's HVAC (Heating Ventilation Air Conditioning) system is N+1 redundant. This ensures that a duplicate system immediately comes online should there be an HVAC system failure.
    Every 90 seconds, all the air in our data centers are circulated and filtered to remove dust and contaminants.
    Our advanced fire suppression systems are designed to stop fires from spreading in the unlikely event one should occur.

  • Conditioned Power: Should a total utility power outage ever occur, all of our data centers' power systems are designed to run uninterrupted, with every server receiving conditioned UPS (Uninterruptible Power Supply) power.
    Our UPS power subsystem is N+1 redundant, with instantaneous failover if the primary UPS fails.
    If an extended utility power outage occurs, our routinely tested, on-site diesel generators can run indefinitely.

  • Core Routing Equipment: Only fully redundant, enterprise-class routing equipment is used in Rackspace data centers. Fiber carriers enter our data centers at disparate points to guard against service failure.

  • Network Technicians: We require that the networking and security teams working in our data centers be certified. We also require that they be thoroughly experienced in managing and monitoring enterprise level networks.
    Our Certified Network Technicians are trained to the highest industry standards.

     

 

Watch our Video