All commands executed on the server are also logged. Our system runs on dedicated and virtual servers provided by leading cloud providers with provide additional physical security for servers. For example, the racks which host our servers have their own physical key and access code, which are needed for physical access to these servers.
Personnel of our hosting provider cannot access servers without our providing them with the access code based on the RSA key. The servers are running chassis intrusion alarm. When problems are detected, our ops team is notified immediately, and the issues are investigated.
We work closely with our hosting providers to ensure that underlying systems remain secure, and any security breaches are investigated, patched and remediated promptly. Our system operations are logged, and the logs are stored for at least a 7-day period in the cloud.
If needed, these logs may be mined to investigate incidents or to reconstruct a chain of events. Should a security breach occur, we will promptly notify affected users of the nature and extent of the breach, and take steps to minimize any damage.
At cloudHQ, we consider the security of our systems a top priority. But no matter how much effort we put into system security, there can still be vulnerabilities present. We have implemented a responsible disclosure policy to ensure that problems are addressed quickly and safely. If you discover a vulnerability, we would like to know about it so we can take steps to address it as quickly as possible.
We would like to ask you to help us better protect our clients and our systems. Please do the following: E-mail your findings to security cloudhq. Do not use automated tools in your research without our explicit consent. Do not reveal the problem to others until it has been resolved. Do not use attacks on physical security, social engineering, distributed denial of service, spam or applications of third parties.
Please ensure to provide sufficient information to reproduce the problem, so we will be able to resolve it as quickly as possible. If you do not provide information your email might not be processed.
We will respond to your report within 3 business days with our evaluation of the report and an expected resolution date, and we will keep you informed of the progress towards resolving the problem. If, in order to solve a support ticket, we need to have access to filenames or to file content, we are required to ask you for explicit permission to do so. All access will be logged, and you can request audit logs at your discretion. Payment is handled by PayPal, so we are not storing credit card or other billing information.
Forget about spending extra time locating the most current version or emailing files back and forth. Instead, cloudHQ takes care of everything by replicating the data and synchronizing it between accounts in real-time. Minimal Configuration, Abundant Possibilities! While there are ways to perform this same functionality through individual cloud services, they often require custom integration or numerous steps.
For example, to sync Evernote with Google Drive, you must first synchronize notes with all computers linked to the desired account and then export the selected files to Google Drive. Changes in Evernote are not automatically reflected in Google Drive when using this method. You can skip these steps and keep it simple by allowing cloudHQ to accomplish the same task in the background.
The initial backup can take a few minutes or hours, depending on the amount of data in your Google Drive. From this point forward, the syncing service will maintain your backup for you. That way, if Google does go down or something happens to your files, your backup will be available, and you can continue whatever you were doing without interruption. A free plan is available for free Google Drive accounts. Sort By: Most Recent Popular. Step 2.
0コメント