Our core commitment is to the security and integrity of your data and, therefore, we use Amazon Web ServicesI (AWS), the world’s leading cloud service platform, to host our infrastructure.
By using AWS to power our platform, we absorb the highest global standards of AWS architecture, server operations, and compliance regulations to host your data.
When you run IE.Solutions applications, you can do so confidently knowing that your data is secured by AWS best practices and the industry’s most advanced cloud security controls. You can read more about AWS security practices here.
IE.Solutions data are hosted in AWS data centers that have been certified as ISO 27001, PCI/DSS Service Provider Level 1, and/or SOC II compliance. Details provided here.
Amazon is continuously audited by 3rd party compliance controls and holds compliance certifications from the strictest compliance programs including SOC 3 and ISO 27001. Learn more about AWS compliance here.
We use Sqreen, a third-party network security solution, to monitor and protect our infrastructure from automated scanners, bots, and targeted attacks. It blocks attacks and alerts in case of critical threats. It also brings additional features like IP blocking and firewalls that monitor and control incoming and outgoing network traffic.
Backup and Restore
All active IE.Solutions applications are backed up on a daily basis, encrypted with AES-256 encryption keys, and stored across multiple AWS locations. All daily backups can be restored instantly by our support staff. Users are free to manually backup their data at any time by exporting their data to a CSV file.
IE.Solutions enforces strict Disaster Recovery policies including daily encrypted backups, daily testing procedures, and strategic disaster recovery planning and training to ensure that data are available and restorable in case of disaster.
All data is encrypted and secured with SSL.
Encryption in Transit
All data sent to or from our infrastructure is encrypted in transit via industry best-practices using Transport Layer Security (TLS).
Encryption at Rest
All our user data (including passwords) are encrypted using battled-proofed encryption algorithms in the database.
We use SHA-256 and AES-256 encryption, the strongest encryptions available used by governments, banks, and federal-level agencies around the world.
All user passwords are encrypted and hashed.
AWS is GDPR Ready
AWS services can be used in compliance with the General Data Protection Regulation (GDPR). This means that, in addition to benefiting from all of the measures that AWS already takes to maintain services security, clients can rely on AWS services as a key part of their GDPR compliance plans. See details here.
How GDPR applies to IE.Solutions can be viewed here.
Terms of Service
Our Terms outline our obligations and yours if you accept to use our platform as a client. Please read them and let us know if you have questions or concerns.