EZ-CAMP2 Hosted CRM Security

Security in the online world is a critical issue that must be addressed when dealing with a center's key processes and their personal data. SofterWare (developer of EZ-CAMP2 ) understands this importance and the great responsibility that comes with it.

caresecurity

There are several security issues that must be addressed, including:

  • Network Reliability
  • Unauthorized Data Interceptions
  • Hacking Intrusions/Denial of Service
  • Physical Site Protection

SofterWare has committed the necessary resources to ensure your data is safe and secure. To this end, we have partnered with Peer 1, one of the largest server hosting facilities in the world. Peer 1 brings a level of security unmatched by anyone in their field. They are well known to have the most secure, redundant hosting facility available today.

Network Reliability

The events of 9/11 revealed the devastation that can be caused by a single, malicious event. However, most catastrophic events that threaten enterprise applications are from nature. Floods, fire, and earthquakes can be devastating in the damage they can inflict on facilities and equipment. EZ-CAMP2 provides the backup and disaster recovery options to ensure maximum availability and integrity of the application data.

Peer 1 provides a fully redundant network architecture with high-speed connections. Uninterruptible power supplies at data centers ensure that power is never interrupted.


The Peer 1 Network: Fast, Efficient, and Accurate Data Transport

The powerfully built, flexible Peer 1 Global Network uses the best, most up-to-date technologies to provide fast, efficient and accurate data transport. The Network was designed and built by Peer 1 engineers for one purpose: to move Internet traffic - fast. With more direct paths, routing options, and private peering points, Peer 1 speeds your data to its destination with fewer hops, less packet loss and fewer delays. You get guaranteed high performance, plus 24/7/365 network monitoring by the state-of-the-art Network Operations Center (NOC) - all backed by the strength of a trusted and stable industry leader.

The network features OC3, OC12, and OC48 circuits as well as Cisco and Juniper Networks router technology. So, whether you're a large multi-site center or simply need to support multiple users across a LAN, as long as your data is traveling on the Peer 1 Network, you'll have the performance and reliability you need.


Built-in Redundancies

The Peer 1 Network is your seamless connection to the world. The Network features densely meshed paths between most major network points - in North America and internationally.

From the beginning, Peer 1 took redundancy very seriously, building at least two connections, each from a different carrier, at many of the major points in the Network. Because Peer 1 works with a diverse portfolio of carriers, the network is not reliant on one vendor in the event of an outage. These geographic and carrier redundancies ensure that your data will keep moving, even if a link fails.

The Peer 1 Network has multiple, highly secure carrier-class Points Of Presence. Plus, private peering relationships provide multiple routing paths for continuous, uninterrupted transport - data is able to bypass the congestion of the public Internet and get to its destination fast.


Superior Network Support

Peer 1 has 24/7/365 network monitoring at its state-of-the-art Network Operations Center (NOC) which provides real-time alarming, forecasting, traffic management, event notification, upgrades and service level agreements. The NOC also furnishes real-time network status reports to Peer 1 Customer Care, enabling fast, highly responsive, single point-of-contact problem resolution.


Automatic Backups

EZ-CAMP2 provides daily full disk backups of all data. Full database backup tapes are rotated offsite as an added means of recovery should it be needed. Production servers have a RAID 5 setup and contain multiple power/cooling modules and peripheral power supplies. CPU, memory, I/O boards, and hard drives are all hot swappable, eliminating downtime.

On-call support staff is available 24 hours a day, 7 days a week, 365 days a year at Peer 1 to ensure any service problems are handled promptly.

EZ-CAMP2 has a comprehensive disaster recovery plan in place should our primary physical site become inoperable.


Unauthorized Data Interceptions

Secure Sockets Layer (SSL) encryption provides a level of security and privacy for those wishing to conduct secure transactions over the Internet. Introduced by Netscape in the early days of the Internet, the SSL protocol protects HTTP transmissions over the Internet by adding a layer of encryption. This insures that your transactions are not subject to "sniffing" by a third party. Only your users, with the right combination of a EZ-CAMP2 ID and Password, can access your data.

SSL is normally used in tandem with a digital certificate. A digital certificate gives you the assurance that your access to EZ-CAMP2 is legitimately yours and not that of an impostor. It contains information about who owns the certificate (company name, domain name, contact address, etc.), as well as information about the issuing Certificate Authority. EZ-CAMP2 uses VeriSign, the worldŐs largest provider of digital certificates.


Hacking Intrusions/Denial of Service

Intrusions usually take one of two forms. One form can be an attempt to gain unauthorized access to data or the application. Another form can be an attempt to deny service to other users by tying up server resources or disabling the server.

Unauthorized Access - Authentication via username and password provides assurance that a client requesting information is the entity it claims to be. In EZ-CAMP2 , you control the IDŐs and passwords for your organization. Even the EZ-CAMP2 staff cannot know your password. Access control settings limit the functionality available and types of information that users can access after being identified as an authorized user on the system. This allows you to set up users that can only access certain areas of the application. For example, the system administrator has rights to all areas, while a part-time staff memeber may have read-only access to emergency contact information.

Database activity logs record information about the username, time of login and logout, the userŐs IP address, and transactions submitted. This data can be used for auditing purposes and to provide admissible evidence in court proceedings.

Denial of Service - Monitoring of the EZ-CAMP2 application and the hosting equipment is performed 24 hours per day, every 4 seconds. This, combined with the latest technologies in detecting and thwarting denial of service attacks, ensures that you will have uninterrupted service.


Physical Site Protection

Peer 1 data centers are physically secured server facilities designed to keep your information safe. Facilities have keycard and biometric entry, video surveillance and are staffed by technical support people 24 hours a day, 7 days a week. The physical server is located in a temperature-controlled locked cabinet that can only be accessed by technicians for authorized maintenance.

Moving critical applications to the Internet requires a known, trusted partner. For over 25 years, SofterWare has provided thousands of clients the stability and security that they need. EZ-CAMP2 continues this legacy and is committed to earning your trust, and keeping that trust, with our staffŐs expertise and our powerful relationship with Peer 1 to keep your data safe and secure.

More Information +

SofterWare engaged an independent organization to conduct a network vulnerability assessment and penetration test.
Click here to see the results of that test.