Protecting your data is our top priority.
Opal has enterprise grade data security and reliability protocols, (the same banks use) enabling Opal to breeze through the IT velvet rope the world's most uncompromising organizations.
Every part of Opal is SSL enabled and enforced; this level of security is also extended to our mobile interfaces. To access the Opal portal, all customers are required to enter unique login credentials.
The communication between the browser and the application uses 256-bit SSL encryption. Access to the web servers is controlled on multiple levels including firewalls and signed API calls. Each of these layers compliments the capabilities of one another and are designed to protect the data stored within the hosted environment.
Opal’s infrastructure is built on top of Amazon Web Services (AWS). Amazon has years of experience managing and securing large-scale data center and has successfully completed multiple SAS70 Type II audits.
Access to the Opal architecture is fully controlled by AWS who provides 24/7/365 surveillance, strict personnel access, and environmental safeguards.
Opal uses virtual server technology to avoid being affected by physical server failures. In the event of a failure, automatic processes move Opal and customer data away from the affected server. This technology combined with the scale of AWS ensures that Opal will remain online regardless of any number of physical or server-specific software failures.
A complete backup of the database is made hourly, daily and weekly and stored in multiple physical locations.
The Opal architecture is designed so that customer data cannot be accessed or compromised by another Opal customer. The Web application has multiple layers of security to ensure a user can only view, edit and remove the data they are entitled to.