The AH ADSTEXTS cloud infrastructure is housed in secure data centres, designed to satisfy the requirements of our most security-sensitive customers. The AH ADSTEXTS infrastructure has been designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation.
The AH ADSTEXTS infrastructure is protected by extensive network and security monitoring systems.. In addition, AH ADSTEXTS infrastructure components are continuously scanned and tested. The AH ADSTEXTS production network is segregated from the AH ADSTEXTS corporate network, and access to this network is monitored and reviewed on a daily basis by AH ADSTEXTS security managers. The AH ADSTEXTS production network is segregated from the AH ADSTEXTS corporate network and requires a separate set of credentials for access, consisting of SSH public-key authentication through a bastion host using an MFA token. This access is monitored and reviewed on a daily basis by AH ADSTEXTS security managers.
AH ADSTEXTS purpose-builds most of our security tools to tailor them for AH ADSTEXTS’s unique environment and scale requirements. These security tools are built to provide maximum protection for your data and applications. This means AH ADSTEXTS security experts spend less time on routine tasks, and are able to focus more on proactive measures that can increase the security of your AH ADSTEXTS Cloud environment.
AH ADSTEXTS builds its data centers in multiple geographic regions as well as across multiple Availability Zones within each region to offer maximum resiliency against system outages. AH ADSTEXTS designs its data centers with significant excess bandwidth connections so that if a major disruption occurs there is sufficient capacity to enable traffic to be load-balanced to the remaining sites, minimizing the impact on you.
AH ADSTEXTS provides several security capabilities and services to increase privacy and control network access. These include:
On request, we can de-identify the body of messages to satisfy your strict security and compliance requirements.