Nothing is more important to KeyedIn than maintaining the trust of our customers. That’s why the cloud-based solutions we offer rely on several layers of security protections, processes and protocols to ensure client data is safe and private. It’s why the company employs security experts and follows accepted security best practices in every part of our organization. Among the steps KeyedIn has taken to ensure the security and protection of client data include:

  • 24x7 security operations and IDS monitoring
  • DDoS protection
  • Network behavior analysis
  • Host-based IDS
  • Stateful application inspection firewalls
  • Operating system hardening
  • Centralized logging
  • Biometric scanning for data center access
  • Unmarked data center facilities
  • Security camera monitoring with archival system

KeyedIn is ISO 27001:2013 Certified

KeyedIn has achieved certification to the internationally recognized ISO 27001:2013 standard by a leading certification body, the British Assessment Bureau. The certification demonstrates compliance with a recognized international standard for information security for the services and operations supporting the KeyedIn Projects application hosted from data centers within the U.K., validating that KeyedIn operates an effective Information Security Management System.

A Comprehensive Approach to System and Data Security

KeyedIn takes an expansive, multi-layered approach to security, including data center security procedures, processes and systems; data center environmental (HVAC, power, etc.) procedures, processes and systems; information and data security procedures, processes, and systems, including the network, firewalls, servers, and applications; system backup procedures, processes and systems; and customer care monitoring and troubleshooting procedures, processes and systems.

Disaster Recovery Measures

With the world in constant motion, KeyedIn ensures business continuity and disaster recovery plans are in place with alternate disaster recovery sites on standby, should an unforeseen natural or civil disaster emerge. Full system backups are done on a daily basis with transaction log backups done every 15 minutes, allowing for point-in-time recovery.