Core’s servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. These controls include 24/7 monitoring and surveillance, on-site security staff and regular ongoing security audits. Core maintains multiple geographically separated data replicas and hosting environments to minimize the risk of data loss or outages. If an unlikely event occurs, such as an entire hosting facility failure, we can switch over quickly to a backup site to keep Core and your business running. Our servers transmit data securely, across encrypted links.
Data is encrypted using industry-standard TLS (Transport Layer Security) with multiple layers of security controls including firewalls, intrusion protection systems and network segregation. Data is encrypted when we transfer it between data centers for backup and replication. Access to our data centers and servers is controlled and monitored 24/7 by humans and computers, thus protecting your personal and financial data. We also perform regular security audits.
We provide standard access to the Core software through a login and password. We follow a strong password policy and ensure user authentication in every possible way.
Our Security Team proactively monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.