Security

At IXD, we take security seriously. We safeguard your communications with state-of-the-art encryption protocols and datacenters equipped to protect against data loss, even in emergencies. If you'd like to have a more in-depth dialog around the steps IXD takes to protect your data, please contact us at info@ixd.co.

Encryption

Any information you send or receive is encrypted end-to-end, including while at rest. Your data is stored in Amazon Simple Storage Server (S3) servers and encrypted automatically using Advanced Encryption Standard (AES) 256, a secure symmetric-key encryption standard using 256-bit encryption keys. Upon login, all communications and data sharing between IXD and the user are encrypted using either Secure Socket Layer (SSL) or Transport Layer Security (TLS) encryption protocols and up to AES 256-bit encryption. Your files are also protected while at rest on our servers with AES 256-bit encryption. We use a trusted certificate authority and protect all encryption keys with multiple layers of security.


Data Centers and Server Infrastructure

We leverage the world-class data centers and server infrastructure of Amazon Web Services (AWS). Amazon S3 provides a highly durable storage infrastructure designed for mission-critical and primary data storage. The AWS secure data centers utilize state-of-the art electronic surveillance, leverage multi-factor access control systems and are protected 24x7 by trained security personnel. You can learn more about Amazon Web Services security processes at http://aws.amazon.com/security/.


Redundancy

IXD user data is stored in Amazon S3 data centers. Amazon S3 redundantly stores data in multiple facilities and on multiple devices within each facility. To increase durability, Amazon S3 synchronously stores your data across multiple facilities before confirming that the data has been successfully stored. Therefore, every document and piece of data is automatically and immediately copied to multiple locations for redundancy. Consequently, there is no lag time in backup creation, ensuring data is available instantly after an interruption in any one location.