Enterprise Security

Enterprise-level Security

Enterprise Security

We understand that protecting project data security and privacy is a prerequisite for the survival and development of our business. That's why we take comprehensive measures to ensure the security and privacy of our data and incorporate these measures into the business processes of our products. We ensure the data security and privacy of SaaS services from the following four aspects.

Physical Security:
  • Carrier-grade data center:Zhicang Investment Management Software uses industry-leading cloud hosting services. All servers are deployed in a carrier-grade data center and maintained and managed by a professional IDC computer room team.
  • Strict security audit:The data center adopts a strict access security audit system. All personnel entering and leaving are strictly controlled. The data center is equipped with an access control system to strictly verify the identity of the incoming person, prevent any unrelated persons from entering, and ensure the privacy of the computer room space.
  • Strict security monitoring:The data center is equipped with a 7 * 24 * 365 security monitoring system, and all activities inside the computer room are recorded with cameras. The data center is equipped with professional security personnel who are on duty 24/7 and are available to inspect at any time.
Network Security
  • Use 128-bit SSL encryption: All applications of Think Warehouse Financial Information use encryption technology to transmit sensitive data, and SSL encryption is used to ensure that all data is secure during network transmission. On the software service page, you can see the "https" logo in the browser address bar.
  • Equipped with intrusion detection system (Ids) and intrusion prevention system (Ips): through the deployment of carrier-grade firewalls, equipped with Ids / Ips and other systems, plus excellent system architecture design, multi-layer data and parameter transfer processing to prevent cross-site scripting and SQL Injection attack.
Strict Management Of People and Processes
  • Strict data access authorization system: In Think Tank Financial Information, only the technical director (company partner) has data server management authority, and the maintenance of the data server must be operated by the technical director himself, and no other person can be entrusted.
  • Standardized project service process: Only when the project requests, recognizes and authorizes (signs an authorization agreement), our service personnel will access the project data under project monitoring. All data access without project authorization is forbidden.
  • Strict security implementation and auditing mechanism: Zhicang Investment Management Software adopts a unified security management, identity permission management system, and multi-layer protection strategy to ensure the security of core applications and key data. The website server, data server, and application server are completely isolated; the application system data is stored in different databases or data tables to ensure the security of different application data; the data between enterprises is completely isolated from each other, which prevents data penetration between enterprises.
  • Business protection of confidentiality agreement: When the project signs a contract with us, we will sign the same and sign a confidentiality agreement to ensure that our company and individuals will not disclose the project data and privacy in any form.
Redundant Backup And Continuous Operation Guarantee
  • Highly-available distributed server clusters: The data center where the warehouse management software is located is equipped with high-performance clusters consisting of dozens of high-performance servers, which can ensure the high-performance operation of all services. There are multiple standby server nodes inside the cluster. Once a failed node is found, it can be automatically taken over; therefore, no matter how many nodes fail, it will not affect the service of the overall system. At the same time, we also ensure high availability of various services by minimizing planned and unplanned downtime and hot upgrades of uninterrupted business.
  • Highly redundant hardware configuration: All the hardware deployed in the data center, from firewalls, routers, switches, to network cards, power supplies, and hard disks inside the server, are at least two copies; any one is damaged, it will be automatically switched, and Hot-swappable, online replacement. The data center adopts an advanced north-south intelligent dual-line interconnection and interworking solution, and is equipped with a dedicated fiber-optic access for China Netcom and telecommunications, which can be accessed by high-speed users in North and South China and overseas.
  • Comprehensive disaster protection measures: In order to ensure the uninterrupted operation of the project 7 * 24 * 365, the data center has adopted a full range of protection measures to ensure that the services provided by Zhicang Investment Management Software will not be affected by power failure, fire, humidity and high temperature. Disturbance due to changes: Uninterruptible power supply protection: To ensure uninterrupted operation of the system, it can operate as usual even in the event of a municipal power outage.
  • All-weather automatic backup cluster: The data center where the system is located is equipped with a powerful backup server cluster. The system backs up data to the disaster recovery center every morning. It can achieve a powerful automatic all-weather backup, provide non-disruptive backup and recovery processes, and achieve comprehensive data security. protection.
  • Real-time data backup mechanism: In addition to the 24-hour automatic backup mechanism provided by the data center, Think Warehouse Investment Management Software has added a system data real-time backup mechanism to ensure 100% security of project data.
  • Data archiving and export services: Think Warehouse Financial Information Investment Management Software and other applications support batch import, export, and report output of project data, which can ensure the highest degree of flexibility in project data.

With the above comprehensive data security and privacy protection measures, you can fully enjoy the efficiency and fun brought by cloud management.