Established providers of web-based services have gone to great lengths to protect against threats. They run their data centers using custom hardware running a custom OS and file system. Each of these systems has been optimized for security and performance. They work with external parties to constantly test and enhance security infrastructure to ensure it is impervious to external attackers. And because they control the entire stack running our systems, we are able to quickly respond to any threats or weaknesses that may emerge.
Internally, your data is virtually protected as if it were on its own server. Unauthorized parties cannot access your data. Your competitors cannot access your data, and vice versa. In fact, all user accounts are protected via this virtual lock and key that ensures that one user cannot see another user’s data. This is similar to how customer data is segmented in other shared infrastructures such as online banking applications.
The hosting provider maintains a number of geographically distributed data centers. Their computing clusters are designed with resiliency and redundancy in mind, eliminating single points of failure and minimizing the impact of common equipment failures and environmental risks. Access to our data centers is restricted to authorized personnel.