Security measures implemented by Cloudbizz

A1. Where are the data located?

The data is physically hosted in two separate data centers operated by Interxion in Belgium.
These two facilities are ultra-secure data centers, equipped with all required certifications, including the most important one: ISO 27001.

A2. How is the security of the premises ensured?

These premises/buildings benefit from complete redundancy, continuous power supply, effective air conditioning, as well as various fire protection and leak detection measures.

A3. How is the security of the server rooms ensured?

Access to the server room is continuously monitored by on-site security personnel, 24/7.

Once access rights are verified and validated, our technician is authorized to enter our private spaces using a badge, biometric fingerprint, and key.

Additionally, the rooms are equipped with a large number of security cameras.

A4. How is user identification and authentication ensured at the platform level?

Our platform requires the use of Okta, ensuring smooth and secure access for all users.
As a leading identity management solution, Okta is trusted by over 10,650 organizations worldwide for user authentication, authorization, and management.

To protect user accounts, our platform blocks access for 30 minutes after multiple unsuccessful login attempts, while simultaneously alerting our infrastructure team and notifying the user via email.

The Okta Verify application provides users with additional security measures based on geolocation, contributing to a secure and reliable experience.

Furthermore, we implement advanced security tools on all our servers by establishing a whitelist to only allow approved files and applications to run.

This approach provides granular control over application interactions, thereby enhancing overall security.Finally, our platform utilizes privilege escalation control mechanisms for maximum protection and peace of mind.

A5. What is the security of user data access?

Benefit from unparalleled security, as each company and client is assigned a unique Organizational Unit (OU) within our multi-tenant Active Directory.

We ensure maximum confidentiality by granting exclusive access to directories, files, and client data to each individual OU.

Our platform prioritizes secure data access by limiting it to authorized administrators and meticulously logging all activities.

For increased transparency, we can also provide a comprehensive access report.
To reinforce server protection, we use an EDR-type software solution that allows only approved applications to run.

Additionally, Cloudbizz platform users also benefit from protection when accessing the Internet from their session, thanks to a DNS Filtering solution.

DNS filtering involves examining DNS queries issued by users or devices and blocking or allowing access to certain websites based on predefined rules.

A6. Data backups

We use various backup systems to ensure we can always restore your data, performing multiple backups per day, including :

- Every 2 hours: Snapshot of data on our server disks with a backup copy sent to a dedicated storage bay located in the opposite Datacenter.
- Every 4 hours: Snapshot of files in the common and other directories on Cloudbizz.
- Every evening: Backups of all virtual machines by Rubrik with replication in the second Datacenter.

We also synchronize all our LUN units with a backup storage controller to avoid any impact in case of SAN failure.

Our entire platform is fully redundant at all levels, including Internet connectivity, routers, switches, servers, SAN, etc.

A7. Software used to protect our platform

- AD Audit (for active directory monitoring) with SMS alerting
- ESET NOD32 (Antivirus)- ThreatLocker (EDR solution)
- N-Able DNS Filtering (to protect our users on the internet)
- VadeSecure Cloud (Antispam Solution)
- Netscaler (the doors of our cloud, SSL Encryption)
- Pfsense (Firewall)
- FS Network with ACL in place

A Network Access Control List (ACL) is composed of rules allowing either access to or denial of access to an IT environment.

A8. Insurances

In addition to our liability insurance, we also have specific cybersecurity insurance provided by Hiscox.