Our promise

Data security and infrastructure are an integral part of Alpha-i’s technology. We’re committed to ensuring all necessary security precautions are taken and we comply with the leading standards, security certifications and penetration testing available.

Security

Physical

Access to all data centers is strictly managed. Permission is only granted to a privileged few granted with clearance. These locations are scattered throughout their US and EU bases, with heavy security and monitoring. 
Access to the data centers are broken into levels of authorization. The highest of which requires multiple key cards access and biometric scanning.


Some security measures in place:

  • Monitored locally and remotely
  • 24/7 Security and surveillance, both physical and heat sensitive CCTV
  • Restricted and verified access mechanisms
  • Established multistage procedures to manage access policy

System and Network

Custom software monitors and manages all infrastructure. This ensures resilience to threats. Security consultants work on regular schedules to continually review and test the security of the platform, safeguarding it from new potential issues.
 Strict data audits help to uncover possible security flaws on a frequent basis and repairs and responses to occurrences are dealt with immediately.
 Datastore servers are behind their own firewalls, and are only available to the application they are associated with.

Application

Alpha-i is protected by Secure Socket Layer (SSL) providing both server authentication and 256-bit AES data encryption. This ensures that your data is safe, secure and available only to registered users in your organization, with relevant permissions.

Endpoint Protection Mechanism

Authentication is on all public endpoints and SSL encryption protecting credentials.

Encryption Supported

  • 128 bit TLS 1.2 using AES_128_GCM with ECDHE_RSA key exchange.
  • Data at Rest: Each Cloud Storage object’s data and metadata is encrypted under the 128-bit Advanced Encryption Standard (AES-128), and each encryption key is itself encrypted with a regularly rotated set of master keys.

Database information

Our data store provides a robust, scalable storage for your web application, with the following features:

  • No planned downtime
  • Atomic transactions
  • High availability of reads and writes
  • Strong consistency for all reads and queries
  • Database data and metadata is encrypted under the 128-bit Advanced Encryption Standard (AES-128), and each encryption key is itself encrypted with a regularly rotated set of master keys.