CRM Data Security

RSoft Technologies

Security for CRM Environment

Customer Relationship Management software has been a buzzword in the Information Technology industry for quite a few years now. Many companies are looking at how CRM can help make them more successful by providing an extensive customer information database in which Sales, Marketing, Service, and other departments can use a variety of ways to better serve the customer. In today's competitive marketplace, good customer service is extremely important. There are many software vendors selling CRM software packages that offer

What is CRM (Customer Relationship Management)?

CRM has a different definition for every company. I would best explain CRM as a combination of processes, polices, and technology that is driven by business philosophy centered on the customer. A company that wants to implement CRM is attempting to fully satisfy, understand its current customer base, and attract more customers. By optimizing the business model the company hopes to make its relationship with the customer satisfying. This helps the company save money, and generate more revenue by understanding the customer demographic better.

Try our unified customer experience platform.

Deliver an exceptional experience to every customer across all stages of their lifecycle & convert them into brand advocates

Physical Security

  • 7x24x365 Security. The data centers that host your data are guarded seven days a week, 24 hours a day, each and every day of the year by private security guards
  • Video Monitoring. Each data center is monitored 7x24x365 with night vision cameras.
  • Controlled Entrance. Access to the RSoft data centers is tightly restricted to a small group of pre-authorized personnel.
  • Biometric, two-Factor Authentication. Two forms of authentication, including a biometric one, must be used together at the same time to enter aRSoft data center.
  • Undisclosed locations. RSoft servers are located inside generic-looking, undisclosed locations that make them less likely to be a target of an attack.
  • Our data centers are hosted in some of the most secure facilities available today in locations that are protected from physical and logical attacks as well as from natural disasters such as earthquakes, fires, floods, etc.

    Network Security

  • Secure Communication. All data transferred between your browser and RSoft servers are secured with industry standard 256-bit SSL encryption.
  • IDS/IPS. Our network is gated and screened by highly powerful and certified Intrusion Detection / Intrusion Prevention Systems.
  • Control and Audit. All accesses are controlled and also audited.
  • Secured / Sliced Down OS. RSoft applications run inside a secured, sliced-down operating system engineered for security that minimizes vulnerabilities.
  • Virus Scanning. Traffic coming into RSoft Servers is automatically scanned for harmful viruses using state of the art virus scanning protocols which are updated regularly.
  • Select Employees. Only employees with the highest clearance have access to our data center data. Employee access is logged and passwords are strictly regulated. We limit access to customer data to provide support and troubleshooting on our customers' behalf.
  • Audits. Audits are regularly performed and the whole process is reviewed by management
  • Our network security team and infrastructure helps protect your data against the most sophisticated electronic attacks. The following is a subset of our network security practices. These are intentionally stated in a very general way, since even knowing what tactics we use is something hackers crave. If your organization requires further detail on our network security, please contact us.

    Redundancy & Business Continuity

    One of the fundamental philosophies of cloud computing is the acknowledgment and assumption that computer resources will at some point fail. We have designed our systems and infrastructure with that in mind.

  • Distributed Grid Architecture. RSoft services run on a distributed grid architecture. That means a server can fail without a noticeable impact on the system or our services. In fact, on any given week, multiple servers fail without our customers ever noticing it. The system has been designed knowing that server will eventually fail - we have implemented our infrastructure to account for that.
  • Power Redundancy. RSoft configures its servers for power redundancy from power supply to power delivery.
  • Internet Redundancy. RSoft is connected to the world and you- through multiple Tier-1 ISPs. So if any one fails or experiences a delay, you can still reliably get to your applications and information.
  • Redundant Network Devices. RSoft runs on redundant network devices (switches, routers, security gateways) to avoid any single point of failure at any level on the internal network.
  • Redundant Cooling and Temperature. Intense computing resources generate a lot of heat, and thus need to be cooled to guarantee a smooth operation. RSoft servers are backed by N+2 redundant HVAC systems and temperature control systems.
  • Geo Mirroring. Customer data is mirrored in a separate geographic location for Disaster Recovery and Business Continuity purposes.
  • Fire Prevention. The RSoft data centers are guarded by industry-standard fire prevention and control systems.
  • Data Protection & Back-up. User data is backed-up periodically across multiple servers, helping protect the data in the event of hardware failure or disaster.
  • Try our unified customer experience platform.

    Deliver an exceptional experience to every customer across all stages of their lifecycle & convert them into brand advocates