Security Practices

At Sign by X, we take security very seriously and have developed a comprehensive set of practices, technologies and policies to help ensure your data is secure. This document outlines some of the mechanisms and processes we have implemented to help ensure that your data is protected.


Physical Security

Sign by X is operated on private, SSAE-18 SOC 1 & SOC 2 certified, HIPAA compliant, data center providing our clients with fast, secure, and reliable performance. Sign by X also leverages state-of-the-art green technologies, making our data center among the most energy efficient world-wide.

  • 24/7/365 Building Security. The data centers that host your data are guarded seven days a week, 24 hours a day, each and every day of the year.

  • Video Monitoring. Each data center is monitored with IP Camera Surveillance.

  • Controlled, Escort-Only Access, Entrance. Access to the Sign by X data centers is tightly restricted to a small group of pre-authorized personnel.

  • Biometric Authentication. Two forms of authentication, including a biometric one, must be used together at the same time to enter a data center.

  • Undisclosed Locations. Sign by X servers are located inside undisclosed locations that make them less likely to be a target of an attack.


Network Security

Sign by X security team and infrastructure helps protect your data against the most sophisticated electronic attacks. The following is a subset of our network security practices. 

  • SSL Certification. The communication between your computer and our servers is encrypted. What this means is that even if the information traveling between your computer and our servers were to be intercepted, it would be nearly impossible for anyone to make any sense out of it.

  • IDS/IPS. Our network is gated and screened by highly powerful and certified Intrusion Detection / Intrusion Prevention Systems.

  • Control and Audit. All accesses are controlled and also audited.

  • Virus Scanning. Sign by X servers are scanned for viruses using top of the line up to date virus scan protocols.


Staff Processes

Our data center infrastructure is not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day to day operations. 

  • Access Employees. Only employees with the highest clearance have access to our data center data. Employee access is logged and passwords are strictly regulated. We limit access to customer data to only a select few of these employees who need such access to provide support and troubleshooting.

  • Audits. Audits are regularly performed and improvements made based on those findings.

  • As-Needed Basis. Accessing data center information as well as customer data is done on an as-needed only basis, and only when approved by management.


Redundancy

Sign by X is designed to protect your data and security even in times of system failures. 

  • Redundancy. Sign by X is designed to protect your data and security even in times of system failures.

  • Internet Redundancy. Sign by X is connected to the world –and you- through multiple Tier-1 ISPs. So if any one fails or experiences a delay, you can still reliably get to your applications and information.

  • Network Devices. Sign by X runs on redundant network devices (switches, routers, security gateways) to avoid any single point of failure at any level on the internal network.

  • Cooling and Temperature. Intense computing resources generate a lot of heat, and thus need to be cooled to guarantee a smooth operation. Sign by X servers are backed by temperature control systems.

  • Fire Prevention. The Sign by X data centers are guarded by industry-standard fire prevention and control systems.

  • Data Protection & Back-up. User data is backed-up periodically across multiple servers, helping protect the data in the event of hardware failure or disaster.