How is my production data secured?

Below is an overview of Evocon’s server level security.

Connection to client

All communications between client and Evocon servers take place over HTTPS secured connection using standard SHA256 algorithm.

Connection between servers

Connections between internal Evocon nodes are made in context of IPSec protected virtual private networks. Nodes are divided in security groups which restrict access by protocol /ip /port.

Server protection

HIDS and antivirus protect application nodes.

Server access

It is mandatory for the administrators to have strong passwords and ssh keys to access Evocon nodes.

Log policy

Logs are kept in Amazon CloudWatch service with retention period of 6 months.