Security is a part of our culture. We've taken extra efforts to ensure that customer and business data is always secure, so that you can rest easy that your business is protected.
Deposit uses advanced, industry-recognized security protocols to keep all of your drilling and sampling data private and confidential.
With Deposit, you get the convenience of hosted storage without the extra effort and cost of creating and managing backup copies on your own. We do it for you.
Our customer's privacy is important to us. We value the trust you've given us to protect your privacy. We do not sell, rent or share any of your information with third-parties.
Deposit uses redundant servers and data is replicated across multiple sets. Even if one server becomes unavailable, your account won't be affected. You will be able to access your data online wherever you are.
You have complete control over who can access your data, and what they can see and do with it. Each user you invite to use Deposit must create a unique password that no one else will have access to.
Deposit has behind-the-scenes logging features that cannot be turned off by a user. You'll have a complete record of activities, and always have the ability to trace all transactions to their source.
All communication with Deposit is done through a secure socket layer (SSL) connection with each user’s computer (or device). This enables users to transmit data privately and prevents other computers from seeing anything that is happening. SSL provides 128-bit encryption so that all information sent over the Internet during your session remains private and confidential. This encryption technology is the same that is used by the world’s top banks and financial institutions.
Access to data within your Deposit instance is governed by access rights, and can be configured to define granular access privileges. Deposit has various permission levels for users (admin, end-user, reviewer) accessing your account.
The Deposit API is SSL-only (encrypted) and only available to verified users. User and application keys are required to authorize access and provides a mechanism to log all API activity.
The Deposit security architecture consists of multiple trusted networks that do not allow public connections. Security groups and key files are used to control access between trusted networks and members of the replica-sets.
Our software and hardware infrastructure is updated regularly with the latest security patches.
Internal access to the Deposit production network is restricted by an explicit as-required basis and is controlled by our operations team. Minalytix employees accessing the Deposit production network must authenticate with their individual authentication credentials and use multiple factors of authentication.
Deposit is hosted on the Amazon Web Services (AWS) cloud platform. “AWS data centres are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data centre floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.”
Deposit's service clustering and network redundancies eliminate any single point of failure. Our backup process ensures customer data is actively replicated across all systems and facilities. Our disaster recovery program ensures that all services remain available or are easily recoverable in the event of a disaster.
The Deposit QA team reviews and tests the code base using a combination of manual testing and automated testing tools. Testing and staging environments are separated physically and logically from the production environment. No actual customer data is used in the development or test environments.
All Minalytix employees are required to sign non-disclosure and confidentiality agreements. Our teams continuously monitor system health and integrity and keep informed of security best practices.
Minalytix outsources third party security experts, on a regular basis, to perform real-world penetration testing consisting of network, application, wireless, and social engineering engagements to demonstrate and test the security level of our systems and infrastructure.