The Aiera platform protects your organization’s confidential information with the most secure and resilient protection protocols. At Aiera, the protection of highly confidential data is top-of-mind, so we can give the most heavily regulated firms peace-of-mind.
- End user communication to Aiera’s servers is done via HTTPS secure web protocol and behind a user-authenticated login process
- Client content is automatically encrypted using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard, using 256-bit encryption keys
- Database and system drives that store user data are directly encrypted
- Amazon Web Services offers the most secure and hardened infrastructure as the leading data center provider
- Amazon Web Services’ state-of-the-art electronic surveillance and multi-factor access control systems add another layer of protection for users’ data
- Amazon’s data centers are staffed 24/7 by trained security technicians, subject to strict background checks, and access is authorized strictly on a privileged basis
- Access to servers is protected by multi-factor authentication protocols, and user access control is managed by Identity Access Management tools, via secure communication sessions over SSL/TLS
- Aiera has a daily backup policy, guaranteeing that data can be restored if lost
- Aiera ensures preparedness and continuous protection in case of unforeseen events as part of our emergency protocol
- We are constantly evaluating and managing information technology risk
- Finally, Aiera’s strict training on information security procedures greatly diminishes risk
- Firewall ingress and egress ports are restricted to the minimum ports necessary.
- Subsystems are further isolated to Virtual Private Clouds without Internet access, which limits access to only specific servers within the firewall
- All third-party libraries are monitored for vulnerabilities and patched promptly
- All commits into our source code version control system are cryptographically signed as an additional mechanism to verify developer identity beyond the required password and MFA token
- All code changes are reviewed by multiple developers with an intention to sniff out potential security concerns
- Confidential call information is stored encrypted at-rest and in-transit
- Controls are in-place to ensure that no one can directly access confidential custom call data without first going through the sanctioned temporary access-grant elevation process
- Monitors are in-place to alert Aiera’s development team immediately as soon as anyone accesses confidential data
- The Aiera system is constantly monitored, logging any access in or out to detect anomalies
- Web service uptime at the server level is continuously monitored for any unexpected incidents or high usage suggestive of denial of service attacks
Questions regarding our Security, Terms of Service, Privacy Policy, or other policy related material can be directed to our support staff by emailing us at hello@aiera.com