Dozuki takes extensive measures to protect your security and proprietary data. Our critical infrastructure is spread across multiple regions to maintain high availability. If servers in one datacenter or region are having issues, we ac t quickly to replace them with machines in another region to keep your site running without interruption.
We employ thousands of automated tests that run on every change to our software and infrastructure to expose potential vulnerabilities before they are ever deployed to production servers. Additionally, every change to our software and infrastructure is reviewed by multiple engineers to better assess and prevent issues.
Our state-of-the art network is located in a secure data center. Physical access to the servers is strictly controlled by a military-grade perimeter, professional security staff, intrusion detection systems, and video surveillance. Staff must pass two-factor authentication no fewer than three times to access the data center floor. All visitors and contractors are required to present identification while signing in, and are continually escorted by authorized staff.
Our data is backed up several times per day, written to more than one server instantly, and stored in multiple locations. Your billing information is encrypted at all times: we use SSL between your browser and our servers, and we store all credit card information in a secure database using industry-standard 256-bit encryption.
We’re fanatical about uptime. All servers have always-on backups. If one system goes down, another automatically replaces it. We’ve even engineered our systems to handle multiple server failures, and bring up additional resources automatically to handle an unexpected load.
Our servers run on a peer-audited, Linux-based open source stack. We update our servers frequently with the latest patches and run our entire network behind enterprise-grade firewalls. Our servers are scanned regularly by an independent third party security vendor.
If you still have concerns or questions, let us know. If you have a security vulnerability to disclose, see our Responsible Disclosure of Security Vulnerabilities page.