ZAPPĀ® Security

SYSTEM AVAILABILITY AND SECURITY

 

WESTAF takes pride in and works diligently to ensure industry-leading system availability and security. The ZAPP® system has the highest level of redundancy necessary to eliminate a single point of failure. We host ZAPP® on a highly secure, multi-tier architecture, which is deployed on a clustered, multi-region cloud environment. The system contains intrusion detection services, utilizing both proactive and reactive network security to ensure the latest in regulatory compliance, including Payment Card Industry (PCI) Data Security Standards (DSS). Firewalls and intrusion detection systems provide the latest security services for the network. Multiple redundant web servers are load balanced to service requests to the system. Data is stored within the latest cloud-based storage services, which are replicated across multiple data centers. The system is continually monitored for optimal availability, reliability, and integrity. ZAPP® uses SSL encryption to secure all account access to all services.


To ensure maximum protection of client data, WESTAF supports all three areas of data security: physical security, operational security, and system security. Physical security includes locking down and logging all physical access to servers at our data center; operational security refers to business processes that follow security best practices to maintain tight security and limit access to confidential information over time; and system security involves locking down customer systems from the inside, starting with hardened operating systems and up-to-date patching.


Physical Security:

  • Data center access limited to data center technicians

  • Biometric scanning for controlled data center access

  • Security camera monitoring at all data center locations

  • 24/7 onsite staff provides additional protection against unauthorized entry

  • Unmarked facilities to help maintain low profile

  • Physical security audited by an independent firm


System Security:

  • System installation using hardened OS with regular security patches

  • System patching configured to provide ongoing protection from exploits

  • Dedicated firewall and VPN services to block unauthorized system access

  • Data protection with managed, incremental backup throughout the day for all data; at least 10 incremental copies of all data at any point in time in multiple physical locations

  • Dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access

  • Distributed denial of service (DDoS) mitigation services


Operational Security:

  • ISO17799-based policies and procedures, regularly reviewed as part of SAS70 Type II audit process

  • All employees trained on documented information security and privacy procedures

  • Access to confidential information restricted to only authorized individuals, according to documented processes

  • Systems access logged and tracked for auditing purposes

  • Secure document-destruction policies for all sensitive information

  • Fully documented change-management procedures

  • Independently audited disaster recovery and business continuity plans in place for server headquarters and support services

  • Best practices used in the random generation of passwords to access cloud instances and accounts

  • All passwords encrypted during transmission and while in storage

  • Secure media handling and destruction procedures for all customer data

  • PCI compliance


WESTAF prides itself on its robust security and data recovery policies. Redundancy, reliability, and security are primary features WESTAF considers in designing and implementing security for hosted systems. WESTAF maintains enterprise-level server capabilities and manages a PCI compliance program that keeps the organization's major web systems constantly compliant.


 

 

Search
Get instruction on how to access your profile, submit an application, check the status of your application, manage images, checkout, and more. Read more...
Locate information on best practices for image sizing, hi­resolution images, and other formatting questions. Read more...
Find answers to the most frequently asked questions.