We understand that businesses are exposed to a range of security risks inherent with information technology systems. With this in mind, we take extensive risk management measures to anticipate vulnerabilities, develop appropriate technology policies and deploy technology.

For example, our team adheres to strict security policies on a day-to-day basis, performs ongoing security and awareness training, implements enterprise-level security infrastructure components and receives both internal assessments and third-party audits.

Our team also goes to great lengths to prepare for natural and manmade disasters to help keep your data safe. Fault tolerance, system redundancy and site redundancy are just a few methods we use to protect ourselves against disasters.

Physical Security

Our data servers are housed at the FIBERTOWN Tier IV Data Center, a facility located in Bryan, Texas. The SAS 70 Type II compliant facility is armed with 24/7 security personnel, biometric and card key access control, and video surveillance.

Operational Security

We use advanced security methodology to protect your data, including:

  • Penetration testing
  • Application profiling
  • Dynamic testing
  • Vulnerability scans

Application Security

User access is only available with a valid email user name and password, which are both encrypted via Transport Layer Security (TLS) during transmission. All data is also protected with end-to-end TLS encryption.

Data Management

Insperity servers are housed at the FIBERTOWN Tier IV Data Center, a facility located in Bryan, TX.

Site Redundancy

Disasters such as tornados, hurricanes, or floods have a potential to destroy an entire facility. In the unlikely event that one of these should occur, we have constructed a redundant site at a remote and secure location that houses redundant copies of all of our critical systems.

System Redundancy

Occasionally, a machine or device will fail. We practice data center redundancy techniques at all of our facilities to protect from any data loss in case of failure, which includes data mirroring, disaster recovery and failover.

Redundant components are used within individual hardware devices to protect both our primary processing facility and our redundant site.

Offsite Hot Backups

“Hot backups” provide the ability to restore data rapidly and reliably. Backups are stored immediately to our redundant site, which is a secure location that can endure nearly any environmental condition.

Availability

We have consistently delivered 99.9% reliability to our clients since our inception by maximizing application availability with multiple data centers.

Our systems are protected by emergency generators (configured as N + 1) that provide backup power, and interruptible power systems (UPSs) are provisioned as 2N.

Concurrently-maintainable 2N cooling is configured to allow for proper heat dissipation, permitting sites to operate within an acceptable temperature range.

Additionally, automatic fire suppression systems are used for fire protection.