Claritum Security Policy Overview
Overview
Claritum provides Security Policy overview information to outline our procedures, policies and equipment. As part of our security policy, we do not release detailed information. However, Claritum will provide evidence of security measures taken in response to a Client’s Security requirements. Claritum’s Security measures are under constant review and continual enhancement.
The software has been developed for secure business critical use by multiple named users within trading partner companies.
User Access
Access to the system is only available via a secure Passport. This enables authorised users to log-in using a User name and password. Dependent on Security guidelines, passwords can be modified and updated on a regular basis. A full audit trail of user activity is available. On request, Claritum can limit individual User access the system to specified time bands and/or from specific machines.
Platform Security
Claritum’s systems are based on a highly secure version of Linux noted for its inherent stability, versatility, scalability and security. Many types of vulnerability commonly associated with other less secure operating systems have been specifically identified and removed. The operating system is constantly maintained by security specialists and patches frequently issued to close the vulnerabilities as they are discovered.
All systems contain integrated firewalls to reject external threats as they occur. Robust industry leading trip wire software is present on all of our systems to constantly monitor and instantly alert Claritum’s systems administrators in the unlikely event of a breach.
All system activity is logged (full audit trail) and all logs are monitored on a daily basis for any activity that cannot be dealt with by the automated security systems.
Secure Connection
All of our systems are protected through the use of SSL-encrypted communications. This provides a similar level of security as most leading internet banking systems.
Server Data Integrity and System Continuity
On-Site Integrity
Claritum uses high-availability systems with multiply redundant hard drives carrying multiple copies of all data on the system. Should any of the drives fail, they can be replaced without interrupting the server at all which means no loss of data and complete business-continuity.
Resilient Infrastructure
Claritum's infrastructure operates on a no-single-point-of-failure principle; each component is duplicated to offer not only fail-over cover but also rapid scalability should the need arise.
Multiple web-servers, database servers, firewalls and load-balancers help ensure that even the complete failure of an entire machine cannot impact the continued operation of the infrastructure as a whole.
Customer-Owned Data Integrity
Upon request, we can arrange for scheduled copies of all data relating to your business, held on our servers, to be sent via email directly to you. The system also allows the downloading of this data at any time via the Management Reporting Module.
Hosting
Claritum's hosting partner is Rackspace, out of appropriate local based data centres. Their world-class hosting expertise and multiply-redundant network connections ensures that connectivity remains at 100% availability.
Physical Security
Each location is managed 24/7 by trained, uniformed security staff to provide a deterrent to unauthorized access. CCTV, with time-lapse videoing, both internally and externally provides information to a security control centre on possible intrusion. Proximity cards control access within the individual facility.
Emergency Response
Key Claritum personnel are notified 24/7/365 by any of our hosting providers’ administration staff should any critical situation arise. In the event of the server load switching over to the backup services, Claritum technical staff are notified and can attend to the situation in a matter of hours.
Internal Network Security
Our network is protected using industry standard firewalls. Every machine on our network is covered by leading anti-virus software constantly scanning both emails and application traffic. Offsite back-ups are constantly maintained for internal data, software code, documentation and other customer specific records.