ICEFLO is proven in supporting clients deliver cutover outcomes with increased confidence and control but with reduced risk and cost. Fundamental to providing such a service is to have the tools and process in place to ensure that the service as provided is safe, secured and trustworthy.
Yes! ICEFLO’s availability is consistently above 99.99%. Customer data is 100% backed up to multiple online replicas with the option of reverting to backup taken over the preceding week.
ICEFLO has its own dedicated client portal that give’s you up-to-the minute availability information. In the event of an unplanned incident we will make you aware of it on our Status site and keep you continually updated.
Yes! Our operations teams monitor software and application behaviour at all hours of the day (or night!) using proprietary and industry-recognized solutions.
Yes! Every component of the ICEFLO service is distributed across multiple servers. These multiple failover instances are there to prevent outage from single points of failure.
Confidentiality is essential so – yes - sessions between your browser and your portal are always protected with top end in-transit encryption, advanced TLS 1.2 protocols, and 2,048-bit keys.
Yes! ICEFLO prevents attacks with sophisticated monitoring and protections including tightly controlled network-level firewalling. In addition, the ICEFLO service architecture has some additional network level protections to ensure that your data is protected.
Application code security is key factor in the ICEFLO software development lifecycle. Our experienced development team carry out manual checks on code prior to the formal testing cycles being carried out.
Yes! ICEFLO is hosted within the IBM cloud that which has leading edge security controls and processes. As is the standard with all the leading data centre providers access to these environments is strictly controlled and managed. ICEFLO is hosted in SOC 2 Type II and ISO 27001 certified and provide N+1 redundancy to all power, network, and HVAC services.
Yes! As the security of your data is key to the service that ICEFLO provides the software development and infrastructure teams regularly compare the stack against the most up to date known security threats. This allows any software updates and patches to be deployed with an urgency commensurate with the threat.
Yes! ICEFLO uses enterprise-grade firewalling, routing, intrusion prevention, and service behaviour analytics to protect infrastructure and thwart attacks.
ICEFLO has a mature patching process and regularly scheduled patching deployment windows. Off course, if a threat is identified as being of very high risk the support teams deploy it as quickly as is possible.
Yes! The software development and infrastructure team test for potential vulnerabilities across all the layers of the service technology stack. In addition to the security testing that the in-house teams ICEFLO undergoes regular external security testing from a PCI Security Standards Council approved scanning vendor.
We do. Over and above the weekly external scans we also carry out regular – twice a year – penetration tests by industry-respected 3rd party penetration testers. This provides a more in-depth review of the security of the ICEFLO environments.
As your data is hosted in ICEFLO you are encouraged to support us in making sure that the service is secure. Through our integrated Zendesk issue logging interface you are encouraged to let us know if you identify any vulnerability or even suspect that something does not “just look right”. By supporting us in this you are helping us keep your data secure.