We’re gonna steal your data! Well…

We’re gonna steal your data! Well…
Imagine being protected by guards with massive firepower, watched over by state-of-the-art security systems, and equipped with the most sophisticated medical supplies just in case you ever start feeling sick. That’s how much care we lavish on your data. And it’s not just us who look after it – we use Amazon’s cloud servers, which offer the highest possible level of security.

Imagine being protected by guards with massive firepower, watched over by state-of-the-art security systems, and equipped with the most sophisticated medical supplies just in case you ever start feeling sick. That’s how much care we lavish on your data. And it’s not just us who look after it – we use Amazon’s cloud servers, which offer the highest possible level of security.

Amazon - Book

RAYNET CRM uses servers belonging to Amazon Web Services (AWS). AWS published a 99-page report which sets out the company’s security measures, right down to the smallest detail. (And yes, we’re not joking – we actually did read the whole thing!)

To cut a long story short – you can sleep soundly knowing that your data are completely secure.

Just to show we’re not kidding (and so you don’t need to read all 68 pages ;-), we’ve chosen five key things the report says about the AWS security systems for client data. (That means our data – in other words, your data.)

Armed guards

Your data are guarded to the same standards as the ADX Florence supermax prison, the famous Alcatraz of the Rockies. The AWS data centers are protected by a highly trained team of armed guards, 24–7.

Seamless backup – whatever happens

Even if there’s a power outage due to storms, floods or other events, all your data will remain completely safe. AWS has data centers at several locations throughout the world – so if something goes wrong at one center, the others will come to the rescue.

Brute force hackers have no chance

AWS is completely resistant to brute force hacking – a technique you’ve probably seen in the movies or on TV.

Put simply, brute force hacking is when hackers try to get round password protection by using a special program and a list of usernames and/or passwords. They try to get access to an account by trying out all passwords on the list (and if there’s no list of passwords, they just try all possible combinations of characters).

If AWS notices a brute force attack coming from a particular IP address, it immediately blocks that address.

Logging every move

AWS operates a service called AWS CloudTrail, which logs all events and activity by users of the AWS cloud. So if something happens, AWS will always know where to send the cavalry.

State-of-the-art encryption

AWS uses one of the world’s most sophisticated encryption programs, the 256-bit Advanced Encryption Standard. First the protected data are encrypted using a unique key, and then this unique key is encrypted again in the standard way. So you get double encryption protection – giving you real peace of mind.

Of course, those are not all the security features the AWS report mentions. But we think these 5 things are the real key features – so now you can sleep soundly knowing that your cloud data are totally secure, protected by RAYNET’s awesome stingray power...