Whether you depend on Phoenix American for all of your transfer agent, sales reporting and accounting needs or as an application-only client, we realize that your sales, transactions and client information are the lifeblood of your business. That is why you can rest assured that your business information is managed by the most robust and reliable IT systems available and protected by security protocols that address every possible threat.
Multiple high-speed connections to tier-one Internet Service Providers
Border Gateway Protocol (BGP4) guarantees best-path routing for both inbound and outbound network traffic
End-to-end system redundancy throughout the network
Secure triple DES network encryption
Network design and implementation utilizing Cisco networking equipment exclusively and SUN Solaris enterprise class database and application servers
Physical Access Controls: Electronic and procedural controls on access to sensitive locations like the Phoenix American Data Center
Network Access Controls: Redundant authentication, authorization, and accounting (AAA) servers; firewall & router-based lockdowns protect network addresses and ports
Server Access Controls: Strict enforcement of password and account procedures; secure, encrypted command sessions; server access governed by firewall rules
Database Access Controls: Application-level user, data, and business function security checks
Intrusion detection hardware deployed in each network zone
Standardized use of mainstream, compliant practice solutions reduces integration and compatibility issues
Fully redundant LAN hardware for instant failover
Multiple, high-speed connections with world-class ISPs
24/7 monitoring of all critical servers and network devices with established notification and escalation procedures
Automated enterprise-class robotic backup and recovery systems
Daily server backups
Off-site storage of backup media to a secure facility - hot reboot capability for minimum downtime
Detailed Disaster Recovery Plan for all business – critical services with multiple recovery sites
Routine testing of detailed Disaster Recovery Plan