- Unique access control with role based access limit
- Database and SQL schema partitioned for isolation
- Encryption for even data at rest
- Intrusion detection & prevention of virus transmission
- Network monitoring to enhance performance
- 256-bit TLS encryption to encrypt and decrypt data
- Mirrored transactions
- Automatic failover
- Daily and weekly system backups (scheduled and incremental)