Security is critical for businesses moving to the cloud. That’s why we put as much effort into ensuring the security of our solution and your data as we do it’s extensive set of features.
For organizations that have barriers to using SaaS solutions, we offer an on-premise version that gives you complete control over your installation.
How we ensure security and availability
iService operates on a private cloud colocated within a secure datacenter with power, physical security, and environmental controls that ensure the security and availability of your system and data 24/7.
All data in motion and backups are encrypted. Users connect to the system with a web browser and HTTPS encrypted Internet connection. HTTP connections are disallowed.
Malware and Ransomware
All incoming email to iService hosted mailboxes is protected by the Barracuda Email Security Service. Every message is evaluated for SPAM and malware. Additional protection is provide by Advanced Threat Protection to protect against malware and ransomware.
High Availability for Email
Redundant mail servers operate in separate physical locations. Email is queued within the Barracuda Email Security Service for redelivery if an event caused all mail servers to become unavailable.
Logical Access Controls
Users have access controls implemented through user types, which are assigned to agents based on their job roles. Separate configurations for business segments enforce access control over the interaction history and customer data of each business unit.
Redundant firewalls operate in HA mode to ensure uptime and security. Separate firewalls are deployed at both the colocation facility level and the iService cloud environment.
iService mailboxes are protected using DMARC, a special protocol that reassures that an email was sent from a specific sender. It eliminates the possibility of phishing, spoofing and other malicious activity.
Each iService tenant is provided a separate dedicated database that is not comingled with other customer data. All customers have the option to move from the cloud environment to their own on-premises installation at any time.
Privacy and Compliance
End users of iService can access their full interaction history and contact information that you store in iService. In compliance with GDPR access requirements, users can modify or remove the details they have provided. Interaction history can be purged, but only by an iService systems administrator
Information Available under NDA
The iService control environment follows the Trust Services framework to ensure the security and availability of your system and data. A full list of controls designed to ensure the achievement of the Trust Services Criteria for security and availability is available with an executed NDA.