Making Software for You!
Innovators for Industry and Institution Software
 
You are here: Home » About Us » Facility

Related Topics: About Us, Contact

Facility and Infrastructure
III Software has a significant investment of time, hardware and support systems in order to provide the highest level of service to our clients and their users. All of our hosted products make full use of the environment we have created.

Our facility includes many features, just some of which are listed below.

Internet Connectivity

  • Dual Internet Connections
  • Separate vendors, networks and lines
  • Redundant DNS services on four different Internet backbone carriers, spread across the country

Network Security

  • Borders protected by Cisco equipment
  • Routers and firewalls monitored and logged
  • Intrusion detection sensors both inside and outside the firewalls
  • Intrusion alarms enabled for local and remote notification

Data Security

  • All transactions secured with SSL (up to 256-bit)
  • Site certificates current, issued by a trusted third party and verifiable
  • Absolutely NO data hosted on Internet-facing web servers
  • All personal data (and most other data) exposed via an Internet application is encrypted on our internal servers
  • Data encrypted using 448-bit Blowfish
  • Maximum security measures supported by the operating system and server software are employed to prevent database exposure
  • Financial transactions use "rolling keys" where each transaction is encrypted with a unique key. In the highly unlikely event the database was exposed, each transaction would have to be 'hacked' individually. There is no potential of hacking an entire database!
  • Clients issued unique encryption keys to protect data in transit
  • Multiple layers of security for end users, client users and administrative staff to control access to sensitive or personal information
  • Client data partitioned both physically and logically
  • Separate and specific privacy statements for each hosted service. These are strictly followed by all personnel with access to any client or user data.
  • External 3rd-party vendor performs comprehensive vulnerability scans

Power

  • All electronic equipment on dedicated "clean" circuits with full surge and noise suppression
  • All equipment surge and UPS protected
  • Natural gas generator with automatic transfer switch -- full power in under 30 seconds

Disaster Recovery / Business Continuity

  • All transactions replicated on internal servers in real time to virtually eliminate the potential for lost or corrupted transactions
  • Dual, daily backup of both live databases and transaction "roll-forward" log files
  • One backup on-site for immediate access, one stored off-site for disaster protection
  • Off-site backups encrypted to protect data
  • Disaster recovery arrangements with data center (18 miles from our location)

Summary
We think the safety, security and reliability of our infrastructure meets the rigid standards our customers demand. We also believe that our environment compares favorably to any organization in our industry, including those many times our size.

We have taken every possible measure to ensure that each client, user and visitor can be confident that their information is safe and secure.

© Copyright 1997-2009, III Software LLC
Page: iii/about/facility.shtml       Last Modified: 12/6/2010