Security Features
1. SECURITY PROGRAM
Nulogy is supported by a SOC2 Type II-compliant information security program. Nulogy’s System and Organization Controls (SOC) Report is an independent, third-party examination report that demonstrates how Nulogy achieves key compliance controls and objectives.
2. DATA CENTRES
Nulogy’s server infrastructure is hosted on Amazon Web Services. The AWS compliance program is designed to follow international security standards and regulations, while protecting confidentiality and data privacy. Its data centres provide the necessary means to operate 24/7 while protecting data from physical damage and network issues.
3. DATA ENCRYPTION
All of Nulogy’s customer-facing, user-accessible services are accessed over the Internet through a modern web browser, and support secure TLS 1.2 or greater transport encryption with strong ciphers while in transit and 256-bit AES encryption at rest.
4. HIGH AVAILABILITY
Nulogy’s software is available to all customers via cloud servers. Nulogy employs a high availability (HA) architecture using an infrastructure-as-code approach. Our architecture is hosted in multiple, redundant availability zones. Each availability zone consists of one or more data centres, which are physically separate from one another. Multiple availability zones enable Nulogy’s applications to automatically fail-over to another Availability Zone without interruption.
5. BUSINESS CONTINUITY
In the event of an emergency, Nulogy and its staff are fully enabled to operate remotely. Our employees are equipped to deliver services remotely and in a distributed manner—from customer support, to on-call procedures, to testing and development.
6. BACKUPS
Nulogy backups are performed daily, encrypted at rest and retained for 30 days. When combined with our high availability infrastructure, you can rest assured that your data is safe with us.