Your operations depend on us. We take this responsibility seriously.

Your business depends on us, and we take this responsibility seriously. We have invested in systems and processes designed to promote reliability and prevent downtime.

Delivered from the World’s Leading Technology Infrastructure

Our primary services are delivered via Amazon Web Services, the world’s leading provider of technical infrastructure. More than a million customers in 190 countries, comprising over 2,000 government agencies, 5,000 educational institutions, and 17,500 nonprofits trust AWS every day with their operations, data, and infrastructure. AWS operates more than 10x the infrastructure of the next 14 hosting providers combined and is growing at a rapid rate. At this time, all of our infrastructure operates from within the Amazon EU Region (Ireland) and all data resides within the Amazon EU Region (Ireland). We employ two communications providers for email (SendGrid) and SMS messaging (Twillio), both of which were formerly EU Safe Harbour participants (and still maintain Safe Harbour compliance despite recent legal changes), and both of which will enter into EU Data Protection agreements if necessary.

High Availability and Redundancy

We operate a fully redundant mirror infrastructure in a separate AWS availability zone to which we can failover if necessary. The second AWS availability zone is geographically separate and receives a copy of transactions and data operations performed on our primary cluster in “real time”. In the unlikely event of a total failure at our primary provider, we can transition operations to the secondary location within minutes.

Data Center Security

Our providers have an impressive security track record for safeguarding your data and operations. Our providers meet or exceed the following standards:
  • SSAE16
  • ISO 27001
  • ISO 27002
  • PCI Security Standards
  • Safe Harbor Certified (and continue to abide by this framework, despite recent legal decisions by the EU), and will enter into an EU Data Processing Agreement.
  • HIPAA Compliant (have signed a Business Associates Agreement with Administrate)

Backups and Disaster Recovery

All critical systems are backed up nightly in addition to our mirror system. All customer data is backed up nightly in addition to being replicated in “real time” to our mirror system. Backups are tested weekly. We have the ability to take additional “snapshots” of a system prior to making changes so that we can revert in the event of an unexpected outcome. Backups are taken nightly, encrypted, and securely transmitted and stored within Amazon S3 which provides for the data to be stored on no less than three physically independent devices for durability. Backups are customer specific, and data is not commingled.

Take a Free Trial!

No Long Term Contracts. No Credit Card Required.

Application and Data Security: A Top Priority

We employ many different layers of security to keep your data safe. These security policies and processes follow industry best practices whenever possible and are periodically reviewed for conformance and compliance.
  • All authentication and data transfer is fully encrypted, and conducted via TLS (the successor to SSL).
  • We employ firewall protections that prevent unauthorized users from attempting to connect to us.
  • We have separate privileges for customer data and application access, and customer data is not commingled.
  • We employ an industry leading 3rd Party Security Scanning service audits our externally facing infrastructure to determine any possible security threats daily.
  • Source Code Management is employed for all applications and development processes.
  • Application source code is hosted using an industry leading secure, third party source code repository.

Service Monitoring and Reporting

We have several different levels of application monitoring to ensure that services are being rendered according to acceptable performance standards.
  • We provide a public operational service status page which documents our historical uptimes and provides information in the event of a service disruption.
  • Uptime monitoring by a 3rd Party (Pingdom) which notifies us when external services slow down or fail.
  • Internal application instrumentation on server loads and performance, in case resources are consumed at unusual rates.
  • We provide status of unusual or degraded operations via our operations Twitter account: @Adm1nistrateOPS

Service Level Agreement (SLA)

Our goal for system uptime is 100 percent each month, outside of scheduled downtime. We normally try to keep scheduled downtime to less than an hour each month. If we fail to achieve 99.9% uptime, measured monthly, we will issue pro-rata credit for your monthly subscription fees. This equates to no more than 40 minutes of unscheduled downtime in any given month.

Administrate is ISO 27001:2013 Certified

Administrate has achieved ISO 27001:2013 certification. The certification and audit were performed by Coalfire, a cybersecurity audit firm with more than 16 years of experience and more than 1,400 government and commercial clients.
  • View our certificate here.
  • View the auditor’s letter here.

Resource Centre

Exclusive content, eBooks, videos and downloads, all about training provision.

Tips, news and freebies in our newsletter!