Security and Redundancy
Security and redundancy are baked into everything we do, as well as getting explicit focus. Architecture and configuration decisions are made based on an understanding of what data lives where, how it is accessed, and what the weak links are. In addition to standard measures such as encryption, firewalls/security groups, replication, backups and monitoring, we consider threat and risk models to understand what can go wrong, both in terms of breaches and in terms of service failures, and implement multiple layers of protection to safeguard your services and data. We also handle ongoing operational procedures such as security reviews, security updates, scans and failure tests to ensure that the measures put in place are continually effective.