Platform security

Designed for security

The AH ADSTEXTS cloud infrastructure is housed in secure data centres, designed to satisfy the requirements of our most security-sensitive customers. The AH ADSTEXTS infrastructure has been designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation.

Constantly monitored

The AH ADSTEXTS infrastructure is protected by extensive network and security monitoring systems.. In addition, AH ADSTEXTS infrastructure components are continuously scanned and tested. The AH ADSTEXTS production network is segregated from the AH ADSTEXTS corporate network, and access to this network is monitored and reviewed on a daily basis by AH ADSTEXTS security managers. The AH ADSTEXTS production network is segregated from the AH ADSTEXTS corporate network and requires a separate set of credentials for access, consisting of SSH public-key authentication through a bastion host using an MFA token. This access is monitored and reviewed on a daily basis by AH ADSTEXTS security managers.

Highly automated

AH ADSTEXTS purpose-builds most of our security tools to tailor them for AH ADSTEXTS’s unique environment and scale requirements. These security tools are built to provide maximum protection for your data and applications. This means AH ADSTEXTS security experts spend less time on routine tasks, and are able to focus more on proactive measures that can increase the security of your AH ADSTEXTS Cloud environment.

Highly available

AH ADSTEXTS builds its data centers in multiple geographic regions as well as across multiple Availability Zones within each region to offer maximum resiliency against system outages. AH ADSTEXTS designs its data centers with significant excess bandwidth connections so that if a major disruption occurs there is sufficient capacity to enable traffic to be load-balanced to the remaining sites, minimizing the impact on you.

Security features

Network security

AH ADSTEXTS provides several security capabilities and services to increase privacy and control network access. These include:

  • Built-in firewalls allow us to control network access to our server instances and subnets
  • Encryption in transit with TLS
  • DDoS Protection
  • SSL Encryption

De-identify message body

On request, we can de-identify the body of messages to satisfy your strict security and compliance requirements.