SMS API Banner

Infrastructure

Secure, scalable, and robust, our infrastructure provides maximum reliability.

Behind every great product is great planning and execution. We try to make sure every contingency is covered, good or bad. With redundant paths, servers, and multiple security measures in place, our infrastructure is designed to provide a high level of service 24-7.

top

Redundancy

The availability of our messaging system to end users is maintained in a number of ways that increase redundancy and scalability.

  • Connections. Redundant connections within our own infrastructure and to our gateways provide users with continuous availability of our services.
  • Servers. Our servers are designed to accept multiple concurrent connections from users. This provides for efficiency, scalability, and availability so that requests are processed in time and all the time.
top

Security

Our infrastructure is locked down by layers of security measures to ensure that your connections and customer data are protected. We work hard to give you peace of mind.

top

Firewall

On the frontline of our defenses are hardware firewalls that are configured only specified protocols and IP addresses.

  • IP filtering allows only approved protocol connections:
    • - HTTP with SSL
    • - HTTP without SSL
    • - SMTP
    • - SMPP
  • Detects and prevents denial-of-service attacks (DoS).
  • Tested to resist common hacking techniques.
  • No customers or outside groups are allowed any direct access to servers.
top

Antivirus

Behind the firewall is an up-to-date antivirus system that actively scans for security vulnerabilities and viruses. Any detected problems are immediately quarantined and resolved.

top

Security Logs

Our web-based services are always available - which means that we’re also on our toes round the clock. We regularly check security logs for suspicious activity and respond immediately to maintain maximum uptime and system integrity.

  • Access to security logs are restricted to authorized individuals only.
  • Security logs are reviewed periodically by authorized personnel.
  • Only on-site security administrators have the ability to configure host operating systems.
top

Server Passwords

Good security starts with good password policies. We follow industry's best practices to take this common vulnerability out of a hacker’s equation.

  • All default account passwords are periodically changed in accordance with password requirements.
  • All security administrative passwords are periodically changed in accordance with password requirements.
top

User/Admin Privileges

Access to the system is restricted by role. Customers have access to only their own data and services, while high-level privileges are strictly limited to our system administrators.

  • System administrator/root (e.g., privileged, super user) access to host operating systems is limited only to individuals requiring such high-level access in the performance of their jobs.
  • System administrators are required to restrict access by users to only the commands, data, and information resources necessary to perform authorized functions.
top

Data

Your data is your gold. We respect that and have designed our infrastructure to keep your information secure in every aspect. Only you have the right to assign permission to your data.

  • For business processes, data integrity is mission critical, which is why we rely on Oracle database to manage your assets.
  • All access is prohibited except for the registered servers in the data center.
  • Data is strictly partitioned.
    • - No data is shared across accounts.
    • - Only sections with appropriate permissions can be accessed to prevent unauthorized access.
  • Multiple backups of the database.
    • - Live backups do not leave the data center.
    • - Secondary backups come online immediately in case the primary database goes down.
    • - Tertiary backups are used for emergency system restoration. This backup data is up-to-date within 15 minutes of the live servers.
  • Information resources that store information, such as our application and database servers, reside on a trusted internal network.
  • There is no external access to the protected internal network.
top

Infrastructure

We’ve taken great care in designing the architecture of our system to be efficient, available, and secure. From the physical layer to the application layer, our network has been hardened against abuse, intentional or not.

  • Our network and information resources are located in secure physical facilities with access restricted to authorized individuals only.
  • Publicly accessible web server data is protected by the implementation of a network demilitarized zone (DMZ). Packet filtering is performed on the data in the DMZ.
  • HTTPS security protocol used on publicly open servers.
  • Redundant servers used for emergency purposes.
    • - ISP failures - A redundant ISP setup is used.
    • - Failures on information resources inside of the intranet - All information resources are set up as active-active or active-standby configurations.
top