Application security begins with every line of code we write. Since our inception, and with each subsequent build, every precaution has been taken to write a secure and compliant solution. We also enforce data integrity for compliance purposes, preventing accidental or purposeful deletions from occurring by implementing archival-based scripting that appears to remove your data upon deletion but instead only “hides” it from view within your database.
Redtail owns and maintains its own equipment, co-located at our three data center facilities, two in Sacramento, CA and the other in Phoenix, AZ. Our Data Centers are in alignment with Tier 3 Requirements based on The Telecommunications Industry Association’s TIA-942.
Backups of Your Data
All of our data, which means your data as well, is backed up nightly in three geographically distinct locations simultaneously. We can also perform full backup recovery in the event of a system-wide emergency. Our platform is also fully redundant and we utilize mirrored drives for all data storage. So if a piece of hardware were to fail on our side your data will not be lost and the platform will not go down. We stand behind our promise of 99% uptime. You can get a current platform system status here.
Firewall and Intrusion Detection
We utilize the latest in Internet Firewall and Intrusion detection systems from Cisco, and our security systems are independently monitored by third-parties to further ensure the security of your data.
Redtail uses 256-bit encryption from GeoTrust, one of the largest and most reputable providers of SSL security in the world. Also, our encryption keys are replaced annually (rather than just renewed) to provide even more security.
Questions and Comments
If you have any questions regarding these Terms or your use of the Site, please contact us here:
Redtail Technology, Inc.
3131 Fite Circle
Sacramento, California 95827
(800) 206-5030 (toll free)
(916) 352-6538 (fax)
Copyright © 2003-2018, Redtail Technology, Inc.
All rights reserved.