Secure, scalable, and robust, our infrastructure provides maximum reliability.
Behind every great product is great planning and execution. We try to make sure every contingency is covered, good or bad. With redundant paths, servers, and multiple security measures in place, our infrastructure is designed to provide a high level of service 24-7.
The availability of our messaging system to end users is maintained in a number of ways that increase redundancy and scalability.
Our infrastructure is locked down by layers of security measures to ensure that your connections and customer data are protected. We work hard to give you peace of mind.
On the frontline of our defenses are hardware firewalls that are configured only specified protocols and IP addresses.
Behind the firewall is an up-to-date antivirus system that actively scans for security vulnerabilities and viruses. Any detected problems are immediately quarantined and resolved.
Our web-based services are always available - which means that we’re also on our toes round the clock. We regularly check security logs for suspicious activity and respond immediately to maintain maximum uptime and system integrity.
Good security starts with good password policies. We follow industry's best practices to take this common vulnerability out of a hacker’s equation.
Access to the system is restricted by role. Customers have access to only their own data and services, while high-level privileges are strictly limited to our system administrators.
Your data is your gold. We respect that and have designed our infrastructure to keep your information secure in every aspect. Only you have the right to assign permission to your data.
We’ve taken great care in designing the architecture of our system to be efficient, available, and secure. From the physical layer to the application layer, our network has been hardened against abuse, intentional or not.