Table of Contents

Security

We want you to sleep soundly at night

Protecting your data is our top priority.

Opal has enterprise grade data security and reliability protocols, (the same banks use) enabling Opal to breeze through the IT velvet rope of the world's most uncompromising organizations.

How is your data protected?

Authentication

Every part of Opal is SSL enabled and enforced using TLS version 1.2; this level of security is also extended to our mobile interfaces. To access the Opal portal, all customers are required to enter unique login credentials.

Secure Connections

The communication between the browser and the application uses 256-bit SSL encryption. Access to the web servers is controlled on multiple levels including firewalls and signed API calls. Each of these layers compliments the capabilities of one another and are designed to protect the data stored within the hosted environment.

Hosting Partner

Opal’s infrastructure is built on top of Microsoft Azure. Microsoft has years of experience managing and securing large-scale data center and has successfully completed multiple SAS70 Type II audits.

Data Center Security

Access to the Opal architecture is highly restricted and controlled by Microsoft Azure who provides 24/7/365 surveillance, strict personnel access, and environmental safeguards.

Business Continuity

Opal uses virtual server technology to avoid being affected by physical server failures. In the event of a failure, automatic processes move Opal and customer data away from the affected server. This technology combined with the scale of Microsoft Azure ensures that Opal will remain online regardless of any number of physical or server-specific software failures.

Data Reliability

A complete backup of the database is made hourly, daily and weekly and stored in multiple physical locations.

Security between Opal Customers

The Opal architecture is designed so that customer data cannot be accessed or compromised by another Opal customer. The Web application has multiple layers of security to ensure a user can only view, edit and remove the data they are entitled to.

How did we do?

Previous | Next

Privacy Policy

Contact