Your Data Security is None Negotiable

The most frequently asked question by our clients before they signed up for our services is, how do you handle security? Security in a way is a determining factor in how most of our clients built their confidence upon our products. A successful partnership requires a successful bilateral confidence that's built upon what we as a company can deliver to our clients. In order for us to be able to deliver the confidence to our clients, whether they are current or future clients, we have to eat, sleep and breathe with security in mind.

 

All of our applications are built from the ground up with security in mind. We will show you how we encompass security using Progenist Total Security Protection™ 5 layers model.

 

Physical Security

Our data center facilities are designed in a multi-faceted physical security barriers designed to discouraged threats created either by nature or human-made disasters. The biggest threat in our industry has always been either internal or external threats. We have done everything humanly possible to prevent any kind of disruption to ensure that our systems are operating as expected by our clients.

 

Our data center facilities include security, power, cooling and fire protection for all of our servers. An access system only grants access to people on a need-to-have basis after proper authentication via finger print, card access and IRIS Scan. Feeds from several UPS systems provide stable, reliable power and a 4-feet high raised floor provides ample and unobstructed space for cold air from up to 9 CRAC (Computer Room Air Conditioning) systems. We have two separate rooms to provide secure space for redundant routing systems that constantly transport data back and forth between our servers and our high speed 30 Gb internet connection. Data streams within our network are protected from external intrusions by redundant firewall systems.

 

Data Security and Business Continuity

Our data security protection are protected and backed up from three different separate geographical location ensuring protection against all possible catastrophe related to data lost. The data are backed up continuously and is stored for 4 weeks and is available for our clients at our data center for backup and disaster recovery. A limited number of Progenist maintain a highly controlled access to customer database for customization, trouble shooting and general customer support. All access to the system are automatically logged and managed by our highly trained staffs. All of Progenist engineers who are designated to access the high security data are thoroughly checked through a background check, financial, and drug screens. We do not employ contractors to manage and maintain our systems.

 

No one will be able to access your information unless you said so. Even our employees has no way on reading some of the data in the database when your company utilized our TrackerSecure™ feature to secure the data. You may store the private decryption key either via our secure dedicated location or you may designate your own location by installing our TrackerKeyManagement™ Server that can only be accesed by our TrackerEnterprise™ system.

 

System Access Security

All access to Progenist is fully encrypted and password protected. User access to Progenist is handled via a valid username and password and the transmission of all of the data is being done via SSL-encrypted. Definition of access control to Progenist is being handled by our Progenist TrackerAccessSecurity™ (TAS). Within TAS, We breakdown our security into three separate functions based on how our clients would like their security to be defined and handled.

 

Progenist TrackerAccessControl™ (TAC) handles how data is accessed by our clients; Progenist TrackerAccessRoles™ (TAR) defines which roles of their employees would be defined based on what TAC does; Progenist TrackerAccessGroup™ (TAG) defines which groups or departments could have the right to access the data. The definition on who can access what data can be defined by company, based on its organizational needs and it is detailed enough that the flexibility and power of the Progenist TAS in most cases exceed the traditional on-premises or any other Cloud Computing Technology providers in the market. We made our system powerful yet flexible enough to be customized to accommodate your company's needs and not the other way around.

 

Data Communications Security

All Progenist™ Data communications are encrypted using our company's generated 4028 bit SSL with RSA encryption. We also required encryption mechanism for all of LDAP communications using LDAPS or SLDAP forms of SSL via our Progenist TrackerGateway™. Progenist TrackerGateway™ is required to be installed in your environment in order to prevent your password LDAP data to be uploaded into our system. Only the data that your company selects and approves will be uploaded to our system. All communications that are happening between Progenist TrackerGateway and our Progenist™ are fully encrypted.

 

To protect our clients' data from malicious network traffic, we built a cluster of firewall located in front of our network to the internet and additional individual firewall in every server that serves all of our clients. Only an authorized Progenist team can review and debug all the transmission down to the packet level on a daily basis. Denial of Service or Intrusion Detection systems are built on top of the firewall and information on any type of attack will be proactively and automatically managed, diverted and sent to our internal security support systems combined with our industry proven Progenist TrackerDesk™ to monitor all of the interactions and activities for audit purposes.

 

Progenist also offers additional service for even higher security communication between companies and our data center. Progenist TrackerVPN™ will provide secure communication tunnels between those two sites and we can configure it so that the only way to access our system is via your corporate network. Even though technically the server and data are located in our data center. However, in order for our support system to manage our Progenist applications, we will still need to build another secure tunneling connection to the server for you. So it's like having a remote secure DMZ zone within your organization somewhere else.

 

Secure Integrated Application

All Progenist™ applications integrate with any third party applications or data source via our HTTPS protocol utilizing variety of techniques such as Web Services, Progenist TrackerAgent™ or email. We support any kind of data source for your HR or ERP application and synchronization of data will be handled securely by our Progenist TrackerGateway™. All of your secure data information will only be stored in Progenist TrackerGateway™ system. Once authentication has been completed by our Progenist TrackerAccessSecurity™, the rest of the communication between Progenist TrackerGateway™ and Progenist TrackerEnterprise™ will be handled via our secure encrypted Progenist TrackerAccessProtocol™ layer.

 

 

 

 

© 2004- PROGENIST™. All rights reserved.