Keeping your data secure in Jubilee

There are three points of interest when thinking about cloud security:

  1. The host application and database containing the information (Microsoft Azure)
  2. The client point of access (the browser)
  3. The pipeline transporting data between the host and client (the internet)
Microsoft Azure Servers

Microsoft Azure Servers

The application and physical database are hosted on the world class Microsoft Azure servers. These servers are located inside the United States and are well protected both in their physical data centers and in their virtual states by Microsoft. Also, sensitive information, such as a social security number, is stored in an encrypted format. Microsoft maintains the data, the servers, the back-ups, and the security; relieving the individual users of the responsibility, expense, and hassle. Learn more about Microsoft Azure servers here.

Point of access

The client point of access is like the front door to your house. A strong door, lock, and frame can prevent most unwanted access – whereas a weak door and frame can easily be kicked in. Jubilee offers multi-factor authorization and IP address restrictions to help secure the “front door”. As an example, you can specify that users must receive and enter a code sent by way of text message to their cell phone the first time they log on from a particular browser each day. This means that even if their password is stolen or leaked, the would-be hacker still wouldn’t have access to the system without the user’s cell phone. Users can also be limited to logging on from only specified IP addresses (such as the office IP address). By combing these features with good passwords, you can provide a strong and secure point of entry to the Jubilee system.

Point of Access
Data Pipeline

Data Pipeline

The last point of interest is the pipeline carrying the data between the browser and the database. Jubilee uses industry standard 256-bit SSL encryption to send and receive data. This protects the data in transit and allows convenient use of the platform from any location.

Cloud Security Summary

All these points of access exist in any networked office environment even when hosting your own data, on your own servers, in your own office.  Most likely, however, your office does not have nearly as much security and redundancy in place as our hosted Azure platform does.  While putting your data on the cloud might inherently feel dangerous because it’s out of your control, it’s actually most likely many times safer and more reliable.

Jubilee Security

Pin It on Pinterest