Security and Data Sovereignty

When running deals, security, confidentiality and reliability are paramount.

 

That’s why thedocyard uses the most technically advanced and secure enterprise application architecture available – for complete peace of mind from an industry-leading solution.

High Availability

24x7x365 service availability with fully redundant servers, automatic failover, load balancing and real-time geo-replication means you can access our system from anywhere at any time, even if a disaster affected one of the data centres.

Data Sovereignty

Your data stays where you want it to and never leaves the designated region which you select. Replication of data occurs within the same region to fully redundant servers so thedocyard can guarantee that your data remains in the same legal jurisdiction at all times.

Privacy and Security Compliance

As you would expect from an enterprise-level solution, thedocyard’s cloud-based platform complies with all the latest privacy and security policies including ISO/IEC 27001 & 27018, CSA STAR, CJIS Security Policy, HIPPA BAA and IRS 1075.

Disaster Recovery

In the event of a situation occurring where an entire data centre is taken offline, the traffic management system will automatically failover to it’s paired redundant sibling, located in the same geographic region ensuring constant availability with zero data loss.

Security

We engage the services of a leading security consultant to advise on policies, procedures and technologies to ensure we constantly and consistently provide the most sophisticated protection for your data from hackers and malicious users.

Penetration Testing

Hackers are constantly innovating and zero-day vulnerabilities are inevitable so we frequently test our systems using white hack security services to simulate malicious attacks on our services to ensure we have the highest possible protection.

Active Monitoring

Our platform is monitored 24/7 by a professional team of engineers who use automated tools and cutting-edge threat management strategies to strengthen threat detection, response and defence for our cloud-based service.

Encryption

Data is encrypted while at rest and in motion. A combination of AES-256 disk encryption, Transparent Data Encryption, TLS/SSL and IPsec ensures at no time is any of your data unencrypted.