As a technology company, we love to talk about how things work under the covers of our software. And as we ask our clients to house their data in the cloud, it is important that they be comfortable with the security of the data. So I will cover the key technologies at work in CR2 and how they benefit the end user.
Amazon Web Services
The software itself – including the program code, database and other related elements – resides on AWS. There are two reasons we chose AWS. First and foremost, data security. AWS has robust controls in place that help ensure security and data protection in the cloud. We are also able to get SOC 1, 2 and 3 reports. You can learn more here. Second, scalability. With AWS we are able to scale CR2 at a moments notice as needs dictate. In fact, the toolset provided by AWS Elastic Beanstalk allows CR2 to auto-scale itself. Sweet!
Unless you’re a propeller-head (like us), you may find this incredibly boring. But here goes…
- ASP.NET 4.5
- MVC 5
- Entity Framework
- SQL Server 2012
- Various HTML 5 technologies
On top of the security that AWS provides, all data communications between your browser and the server are encrypted. That’s why you’ll see ‘https’ in the URL when you’re logged in. Additionally, if you ever forget your password, you will notice that we will not email it to you. Rather, we will create a new and temporary password and mail that to you. Why not mail the forgotten password? Good question… glad you asked. We encrypt your password as we store it in the database and have no way of decrypting it. So your “ILoveFluffyKittens!” password will not be discovered.