FactorFox offers its subscribers reliable, resilient, and scalable software. FactorFox is agile enough to grow with our customers from start up to enterprise. Our three-tier architecture allows our software to run fast and securely.
The presentation tier, or user interface tier, is responsible for interactions with operations, information gathering, and displaying a legible and user-friendly environment.
The “business“ logic tier plays the role of transferring information between the website and the data tier, including integration of the required decision logic or transformation of transferred data.
The data storage tier implements persistent data storage with a relational database.
These are just a few of the ways we’re staying ahead of our competition and giving our factors a competitive advantage over their competition.
FactorFox Software adheres to security standards through its partnerships. It’s imperative we protect our customers’ data and our code is digitally deposited with Iron Mountain to ensure our subscribers are protected on every level. We use RackSpace as our hosting provider because of their infrastructure, certifications, and high standards when it comes to security and reliability.
Our software runs on the best cloud network and RackSpace adheres to the following information security and related certifications and standards.
PCI-DSS (PAYMENT CARD INDUSTRY DATA SECURITY STANDARD)
CONTENT PROTECTION AND SECURITY STANDARD (CPS)
Operations at Rackspace
Rackspace has invested significant resources to ensure it can detect and respond to security events and incidents that impact its infrastructure. It is key to point out that this function does not involve actively monitoring individual customer solutions, but the overarching networking and physical environment including the monitoring of internal networks and employee access customer environments.
Security operations at Rackspace ensure that:
Incidents are responded to in a timely manner and communication is disseminated to the relevant parties
Corrective actions are identified and executed
Root cause analyses are performed
Lessons learned are fed back to the policy and planning functions
This function of our security management system drives continuous improvement of the practices and models we implement to protect Rackspace infrastructure.
An effective mitigation of risks of a cloud solution requires a combination of a secure application architecture and security management disciplines within the service provider. Security Management at Rackspace involves the coordination of the security organization, security controls, and compliance and security operations.
Iron Mountain Escrow Services
Iron Mountain’s trusted escrow verification agents offer unrivaled insight into the composition of your escrow deposits through a five-step approach to verification:
File List Test
Checks that deposited assets are readable, virus-free and—if encrypted—that Iron Mountain has the decryption keys on deposit.
Inventory and Analysis Test
Provides a complete audit and inventory of your deposit, including analysis of deposited media to verify the presence of build instructions and identification of materials necessary to recreate the original development environment.
Validates whether the development environment can be recreated from the documentation and files supplied in the escrow deposit.
Binary Comparison Test
Tests the functionality of the compiled deposit materials by comparing the files built in compile testing to the licensed, executable file running at your site. Full Usability Test —Confirms that the source code placed in escrow will be fully functional in the event of a release. We run a series of tests to ensure that replicated software runs properly, and then create a detailed report of these tests, which includes demonstrations of the functioning software in action.
In short, Iron Mountain’s Escrow Verification Services offer peace of mind in the form of an easy-to-read report that identifies what you have, ensures that it is complete and functional and defines what you would need to do in order to reconstruct your technology should the need arise. It’s risk management made easy, with all the resources and expertise of the world’s leading provider of intellectual property management services at your fingertips.