Security Policy

Matraex Security Practices, Policies & Infrastructure

Updated on: 25 May 2018

Matraex Develops custom software for clients in a secure and reliable way,  so they can keep their data and processes safe.

This document outlines some of the mechanisms and processes we have implemented to help ensure that our data and our customers data are protected. Our security practices are grouped in four different areas: Physical Security; Network Security and Business Continuity.

Physical Security

Our data and data centers are hosted in some of the most secure facilities available today in locations that are protected from physical and logical attacks as well as from natural disasters such as earthquakes, fires, floods, etc.

    • 7x24x365 Security. The data centers that host your data are guarded seven days a week, 24 hours a day, each and every day of the year by private security guards.
    • Video Monitoring. Each data center is monitored 7x24x365 with night vision cameras.
    • Controlled Entrance. Access to the Matraex data centers is tightly restricted to a small group of pre-authorized personnel.
  • Biometric, two-Factor Authentication. Two forms of authentication, including a biometric one, must be used together at the same time to enter a Matraex data center.

Network Security

Our network security team and infrastructure helps protect your data against the most sophisticated electronic attacks. The following is a subset of our network security practices. These are intentionally stated in a very general way, since even knowing what tactics we use is something hackers crave. If your organization requires further detail on our network security, please contact us.

    • Secure Communication. All data transmission to Matraex services are encrypted using TLS 1.2 protocols, and we use certificates issued by SHA 256 based CA ensuring that our users have a secure connection from their browsers to our service. We use the latest and strong ciphers like AES_CBC/AES_GCM 256 bit/128 bit keys for encryption, SHA2 for message authentication and ECDHE_RSA as the key exchange mechanism.
  • Network Events. Network Events are logged and documented to ensure premium uptime

Business Continuity

One of the fundamental philosophies of cloud computing is the acknowledgment and assumption that computer resources will at some point fail. We have designed our systems and infrastructure with that in mind.

    • Redundant Architecture. Matraex services run on a redundant infrastructure we have implemented our infrastructure to prepare and be able to recover from failures
    • Power Redundancy. Matraex configures its servers for power redundancy – from power supply to power delivery.
    • Internet Redundancy. Matraex is connected to the world –and you- through multiple ISPs. So if any one fails or experiences a delay, you can still reliably get to your applications and information.
    • Redundant Network Devices. Matraex runs on redundant network devices (switches, routers, security gateways) to reduce single point failures. As issues are found, additional redundancies are added.
    • Fire Prevention. The Matraex data centers are guarded by industry-standard fire prevention and control systems.
  • Data Protection & Back-up. User data is backed-up periodically across multiple servers, helping protect the data in the event of hardware failure or disaster.

Provider Certifications

Matraex relies on data center and infrastructure providers with certifications like ISO/IEC 27001 as well as SOC 2 Type II compliance.