AIRY9 Security Policies, Practices, & Infrastructure
More than 18 million users worldwide are using AIRY9 services for a long period and some of them are small-scale, medium scale, and large-scale organizations and individuals, etc. AIRY9 service is able to fulfill their needs with high-quality security and data protection. We have implemented modern WAF (Web Application Firewall) security systems to restrict the virus and illegal hacking attack on your private data.
Our security level is definitely better than the security system of your own computer because of the implementation of latest security systems like WAF (Web Application Firewall) and IP based security.
This document has depicted some important points about our procedures and mechanisms we have executed to keep your data 100% protected. We implement mainly 4 types of security practices, like Network Security; Physical Security; Redundancy & Business Continuity and People Processes.
Rock level Network Security
Your data will be saved or protected from illegal hacking and virus attack, by our high-quality firewall and infrastructures and network security experts.
The following are significant points of our network security policies. These are explained purposefully in an easier way and we put a check on illegal hackers. If your organization more queries on our network security policy, please feel free to contact us.
Through TLS 1.2 protocols, all data conduction to AIRY9 services are encrypted, and we use SHA 256 based CA certificates to ensure a secure connection between our service and the browsers of our clients. For encryption purpose, the strong and latest ciphers like AES_GCM/AES_CBC 128 bit/256 bit keys are used, for message authentication SHA2 is used and for key exchange procedure ECDHE_RSA is used.
We have implemented very advanced, certified and powerful Intrusion Detection / Prevention Systems to at the entry area of our network system.
User Access Control and Audit
We perform a manual audit on user access controls through different security tools and software.
Secured / Sliced Down OS
Our operating system is much protected and engineered by security software that reduces
vulnerabilities or virus attacks.
Automatically Virus Scanning
Our web application firewall and security software conduct a high-quality scan of all web traffic coming towards AIRY9 Servers if any harmful viruses are detected and will be healed out from the same traffic.
Physical Security of Datacenters
Our data centers are protected from any logical and physical attacks by the most protected facilities in high-quality hosting server. Physical attacks are meant for the natural disasters like fires, earthquakes, floods, etc. So the devices or units of hosting servers are stored in safety and cool storage place with 100% backup and protected facilities.
24 x 7 Security protections
As the data centers are the most crucial part of web services in hosting server, these are safeguarded by private security guards of our company like anti-virus software, firewall, and security personnel for 365 days of a week.
The right of entry to the AIRY9 data centers is firmly restricted to anybody and a small team of database experts, security experts and authorized personnel.
Each data center is monitored 7x24 hours with night vision or CCTV cameras.
Biometric, two-Factor Authentication
In order to enter a data center of AIRY9, two forms of authentication procedure and a biometric authentication required together at the same time to make the identification valid.
Secret Undisclosed locations of servers
AIRY9 servers are safely stored inside underground or undisclosed locations to get protected from an intention of an attack.
Redundancy and Business stability
We have designed the server system in such a way that always there will be a backup device for any failure situation of active devices. These are being operated by cloud computation systems.
AIRY9 servers are protected safely inside with bullet-proof or strongest walls to ensure any non-breaking chance.
Distributed Grid Architecture
AIRY9 services get operated on a distributed grid design. That means a server failure without notice of our customers, couldn't put an impact on continual service of the AIRY9 site. It means AIRY9 service will be never stopped due to the failure of any device because of the distributed grid design.
AIRY9 is linked to the world multiple Tier-4 data centers and ISPs. So, if anyone fails to receive faster service or experiences a delay in browsing of a website, you can still access to your applications or sites for our advanced multi-tier ISP.
Redundant Cooling and Temperature
The high-quality N+2 redundant HVAC systems are installed with a proper setting to keep the environment of a data center or server storage area and temperature cool and operation smooth.
Redundant Network Devices
AIRY9 runs on various redundant network devices like routers, switches, and security gateways, etc to pass up any single spot of failure at any level on the inside network.
Customer data is backed up by some mirror quality device in a different geographic location for recovery and business stability purposes from a disaster situation.
Data stability & Back-up
We conduct a regular back-up of data from time to time across different servers, provisioning protects the data due to the failure of hardware or disaster.
The AIRY9 data centers are shielded by high-standard fire deterrence and control systems.
ISO/IEC 27001:2013 Security Certifications
AIRY9 has yielded the most popular ISO/IEC 27001:2013 certificate for Applications, Systems, People, Technology, infrastructures, and Processes.
AIRY9 is SOC 2 amenable of Type II and SOC 2 is an assessment of the design and working effectiveness of controls that assemble the AICPA's Trust Services ideology criteria.
For more details on our security certifications and policy, please contact [email protected]
In order to obtain the compliance report's copy, please contact [email protected]
Eligibility for Operation of Datacenters
For a smooth designing and operating data center infrastructure, it needs both technical and restricted approach. This approach includes various policies about escalation, knowledge sharing, management, risk, as well as the regular operations. AIRY9's security specialist team has huge experience in designing and working with data centers and drastically improves our progression over time. AIRY9 has urbanized an international standard practice for data security responsibility and control security.
Selection of our Employees
Only the authorized and trustworthy and technically strong employees have accessibility permission to our data center data. The access of our Employee is logged and passwords are firmly legalized. We restrict access to customer data to few of these selected employees who require such access to render assistance and troubleshooting on behalf of our customers.
Data center information and customer data will be accessed on the as-required basis, and it will be done as per approval by the customer (i.e. for support incident purpose), or as per approval by superior security management to provide a valuable security assistance and maintenance.
AIRY9 invests manpower and money to improve security system of our services and our security researchers work on it continuously. We are dedicated to working with the user community to reproduce, verify, and respond to lawful detected vulnerabilities. Please inform security issues at