The BulkSMS cloud infrastructure is housed in secure data centers, designed to satisfy the requirements of our most security-sensitive customers. The BulkSMS infrastructure has been designed to provide the highest availability while putting strong safeguards in place regarding customer privacy and segregation.
BulkSMS infrastructure is protected by extensive network and security monitoring systems.. In addition, BulkSMS infrastructure components are continuously scanned and tested. The BulkSMS production network is segregated from the BulkSMS corporate network, and access to this network is monitored and reviewed on a daily basis by BulkSMS security managers. The BulkSMS production network is segregated from the BulkSMS corporate network and requires a separate set of credentials for access, consisting of SSH public-key authentication through a bastion host using an MFA token. This access is monitored and reviewed on a daily basis by BulkSMS security managers.
BulkSMS purpose-builds most of our security tools to tailor them for BulkSMS’s unique environment and scale requirements.
These security tools are built to provide maximum protection for your data and applications. This means BulkSMS security experts spend less time on routine tasks, and are able to focus more on proactive measures that can increase the security of your BulkSMS Cloud environment.
BulkSMS builds its data centers in multiple geographic regions as well as across multiple Availability Zones within each region to offer maximum resiliency against system outages. BulkSMS designs its data centers with significant excess bandwidth connections so that if a major disruption occurs there is sufficient capacity to enable traffic to be load-balanced to the remaining sites, minimizing the impact on you.
BulkSMS provides several security capabilities and services to increase privacy and control network access. These include:
Built-in firewalls allow us to control network access to our server
instances and subnets
Encryption in transit with TLS across all services
Data is encrypted in transit and at rest.
De-identify message body
On request, we can de-identify the body of messages to satisfy your strict security and compliance requirements.
BulkSMS offers you capabilities to define, enforce, and manage user access policies across BulkSMs services. This includes:
Identity and access management capabilities to define individual user accounts with permissions across BulkSMS resources
Multi-factor authentication for highly privileged accounts, including options for hardware-based authenticators
Integration and federation with corporate directories to reduce administrative overhead and improve end-user experience
BulkSMS provides native identity and access management integration across many of its services plus API integration with any of your own applications or services.
Monitoring and logging
BulkSMS provides tools and features that enable you to see exactly what’s happening in your BulkSMS environment. This includes:
Deep visibility into API calls, including who, what, who, and from where calls were made.
Log aggregation options, streamlining investigations and compliance reporting.
These tools and features give you the visibility you need to spot issues before they impact the business and allow you to improve security posture, and reduce the risk profile, of your environment.