search
Legal

Security Features

1. SECURITY PROGRAM

Nulogy is supported by a SOC2 Type II-compliant information security program. Nulogy’s System and Organization Controls (SOC) Report is an independent, third-party examination report that demonstrates how Nulogy achieves key compliance controls and objectives.

AICPA SOC logo

2. DATA CENTRES

Nulogy’s server infrastructure is hosted on Amazon Web Services. The AWS compliance program is designed to follow international security standards and regulations, while protecting confidentiality and data privacy. Its data centres provide the necessary means to operate 24/7 while protecting data from physical damage and network issues.

3. DATA ENCRYPTION

All of Nulogy’s customer-facing, user-accessible services are accessed over the Internet through a modern web browser, and support secure TLS 1.2 or greater transport encryption with strong ciphers while in transit and 256-bit AES encryption at rest.

4. HIGH AVAILABILITY

Nulogy’s software is available to all customers via cloud servers. Nulogy employs a high availability (HA) architecture using an infrastructure-as-code approach. Our architecture is hosted in multiple, redundant availability zones. Each availability zone consists of one or more data centres, which are physically separate from one another. Multiple availability zones enable Nulogy’s applications to automatically fail-over to another Availability Zone without interruption.

5. BUSINESS CONTINUITY

In the event of an emergency, Nulogy and its staff are fully enabled to operate remotely. Our employees are equipped to deliver services remotely and in a distributed manner—from customer support, to on-call procedures, to testing and development.

6. BACKUPS

Nulogy backups are performed daily, encrypted at rest and retained for 30 days. When combined with our high availability infrastructure, you can rest assured that your data is safe with us.