Sign Up

World-Class Security Infrastructure

IBM provides state-of-the-art security to ensure that your customer data is never compromised. At Sycle.net, we know that security is crucial to you - that's why security is our top priority. We have partnered with IBM to bring you the most secure data storage and maintenance available today. The result: We deliver unsurpassed security and privacy of our customers' information.

When you sign up with Sycle.net, you'll enjoy the protection and peace of mind that only IBM's world-class security infrastructure can provide.


Security Measures

Security measures include the following:
  • Expert team of experienced, professional engineers and security specialists dedicated to round-the-clock protection of data and systems
  • Continuous deployment of proven, up-to-date firewall protection, SSL encryption, and other security technologies
  • Ongoing evaluation of emerging security developments and threats
  • Complete redundancy throughout the entire Sycle.net Online Infrastructure architecture
Security Details Description
 Physical Security Our production equipment is collocated at an IBM Data Center that provides 24-hour physical security, palm print and picture identification, two feet of solid concrete surrounding the building, redundant electrical generators, redundant data center air conditioners, emergency diesel generators and other backup equipment designed to keep servers continually up and running.
   
 Perimeter Defense The network perimeter is protected by multiple firewalls and monitored by intrusion detection systems. In addition, Sycle.net monitors and analyzes firewall logs to proactively identify security threats.
   
 Data Encryption IBM leverages the strongest encryption products to protect customer data and communications, including 128-bit Verisign SSL Certification and 1024 bit RSA public keys.
   
 User Authentication Users access Sycle.net only with a valid username and password combination, which is encrypted via SSL while in transmission. An encrypted session ID cookie is used to uniquely identify each user. For added security, the session key is automatically scrambled and re-established in the background at regular intervals.
   
 Application Security Our robust application security model prevents one Sycle.net customer from accessing another's data. This security model is reapplied with every request and enforced for the entire duration of a user session.
   
 Internal Systems Security Inside of the perimeter firewalls, systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more. Exact details of these features are proprietary.
   
 Operating System Security Sycle.net enforces tight operating system-level security by using a minimal number of access points to all production servers. We protect all operating system accounts with strong passwords, and production servers do not share a master password database.
   
  Database Security Whenever possible, database access is controlled at the operating system and database connection levels for additional security. Access to production databases is limited to a number of points, and production databases do not share a master password database.
   
 Server Mgmt Security All data entered into the Sycle.net application by a customer is owned by that customer. Sycle.net employees do not have direct access to the Sycle.net production equipment, except where necessary for system management, maintenance, monitoring and backups.
   
 Reliability and Backup All networking components, SSL accelerators, load balancers, Web servers, and application servers are configured in a redundant configuration. All customer data is stored on a primary database server that is clustered with a backup database server for redundancy. All customer data is stored on disk storage that is mirrored across different storage cabinets and controllers. All customer data, up to the last committed transaction, is automatically backed up to a primary tape library on a nightly basis. Backup tapes are immediately cloned to a second tape library to verify their integrity, and the clones are moved to secure, fire-resistant off-site storage on a regular basis. Disaster recovery plans are in place.
 

 

privacy policy