Bank-Grade Security

Bank-Grade Security 2017-12-26T15:34:50+00:00

Unlike installed software where you are thrown to the wolves to protect your system, Bionic gives you bank-grade security as a core part of your service. With Bionic, you get the same high level of security employed by banks, hospitals, and the Department of Defense. Rest assured that you and your clients’ data is safe and secure.

  • SAS 70 Certified – Bionic’s data center has successfully completed the SAS 70 (Statement on Auditing Standards No. 70) Type II audit in compliance with federal Sarbanes-Oxley regulations. Successful completion of SAS 70 Type II audit indicates that processes, procedures and controls have been formally reviewed and are found to be in compliance with the requirements of Section 404 of the Sarbanes-Oxley Act of 2002. The systems and processes evaluated in this audit include system operations, security, monitoring, change management, problem management, and physical security.
  • Secure Data Center – Biometric palm scanners at all facility entrances, card access control at all interior and exterior doors, 24/7/365 on-site security staff, 24/7/365 intrusion detection monitoring, digital surveillance cameras with 30 days storage.
  • Secure Database – Your data is securely stored in a private database using enterprise class Oracle database technology.
  • Secure Network – All systems protected behind intelligent Cisco Switches. All data storage on secure private network. 24/7/365 monitoring of network activity.
  • Secure Hardware – All servers are Hewlett-Packard enterprise-class servers, which are known for their security and used in the most sensitive environments.
  • Secure Operating System – All Bionic servers run on secure and reliable Red Hat Enterprise Linux. Each system undergoes a “hardening” process before deployment which certifies it meets the most stringent security standards.
  • Secure Software – Developed on the enterprise-class J2EE Platform. All data guarded by proprietary Security Manager. User authentication and encrypted passwords, individual and group-level access control lists (ACL), and protected item access logs.