Ensuring that our users’ data is secure is our top priority

For us the security of our products is vital. To achive this we use encryption in all our transit and regular real-time backups. We use several independent processes and data security tools to maintain our system.

Confidentiality

  • All data is encrypted in transit and at rest
  • Regular real-time backups
  • Database in clustered environment with built-in failover
  • Mirrored data centres in separate physical locations
  • Several independent connections to the Internet, uninterruptible power supply, intrusion prevention, protection against fire, climate control and video surveillance
  • Restricted number of login attempts before users are prevented from logging in
  • ISO/IEC 27001 and ISO/IEC 27018 certified datacenter
  • Built in threat detection

Access control for meetings, activities and documents

Only those participating in the relevant meetings have access to their meetings. No one else can see the meetings.

Genuine network protection

The network that interlinks the Stratsys Meetings (the service) production servers is protected by redundant firewalls, intrusion detection systems and load balancers.

Secure passwords and unique user names

Each Stratsys Meetings user has a unique user name and identifies themselves in the system using a personal password for Stratsys Meetings or through Google or Microsoft.

Availability

System status and performance of Stratsys Meetings shows an uptime averaging 99.98%.

Multiple layers of redundancy

The Stratsys Meetings network infrastructure is designed for total redundancy and maximum availability. All business-critical equipment, including routers, firewalls, applications and database servers, as well as storage and network equipment are configured and up and running to ensure seamless transition should anything happen.

Disaster recovery and incident management

The Stratsys Meetings production system is run on a server cluster at two geographically distinct locations. All important servers and applications are installed at both locations to ensure that operations cannot be disrupted in the event of major outages or disasters. In the event of a fault at one of the locations, the other is configured to take over all production tasks with the minimum of service downtime and loss of capacity.

Backup and restore

Stratsys Meetings uses mirroring and backup routines in multiple stages. In the unlikely event a major crash were to occur, the back-up copies are only used to restore the full production system.