Data Center Hosting Environment Data Sheet Online solutions from Vertafore® help our customers focus resources where they are most important— servicing customers and growing their business. Vertafore’s Software as a Service (SaaS) Solutions Our online solutions allow thousands of insurance companies to provide unparalleled service and support every day. Vertafore’s SaaS solutions provide cost savings, high availability, transparent disaster recovery, and multi-layered security; which allows agencies to focus their IT resources in areas that support business growth. System Performance, Monitoring, and Maintenance The equipment in Vertafore’s data center is sized and configured based on peak month-end loads to ensure we do not have drops in performance during peak periods. We have multiple monitoring systems in place to measure performance, and proactively identify potential performance issues. A third-party scripting probe allows us to measure synthetic end-user response time across all of our servers. Vertafore has two separate data centers—a primary active data center facility in Texas and a secondary passive (disaster recovery) data center in Georgia. The primary data center deploys redundant equipment at every level— from the network equipment to the web servers. Vertafore leverages a pooling infrastructure for our web and application servers, and we cluster our database servers for high availability/performance and active/active failover. Vertafore has implemented change control policies based on the information technology infrastructure library (ITIL) standards. The standards that have been adopted ensure that only approved changes are made to the production systems. We employ weekly maintenance windows for system changes such as product updates, operating system patches and security fixes. Key Benefits: Operations Recovery • Segregated duties The power system within the Vertafore Data Center was designed and built for fault tolerance. In the event of a power failure, a large uninterruptible power supply system immediately kicks in and can operate all data center systems. Emergency generators start within seconds of a power failure to support the data center during a power outage. The generators are tested monthly, and are equipped with 48 hours of fuel with a short notice contingency delivery of additional fuel as necessary. Also, at least three versions of set-up, database and configuration information is available at all times. One is live; one is a local backup and finally, there is an off-site backup. We can also provide customers with encrypted backups of data. • Defense in-depth security strategy and architecture • Redundant failover with continuity of operations, high availability, and backup facilities • Third-party audits of operational controls (i.e. SSAE 16) Formal recovery plans are tested at least annually for failover of our primary data center to our secondary data center. Our recovery time objective is 24 hours and a recovery point objective is two hours. Dedicated to Security Our People Vertafore has a full time security team. The team, headed by the Chief Information Security Officer, has oversight of enterprise Information Risk Management which includes information security, data privacy compliance, product and business application security, and incident response. Personnel security measures include nationwide criminal background checks before hire, security and data privacy awareness training, and a signed confidentiality agreement covering responsibilities to protect customer data. Should an employee leave, access to systems is immediately removed. The Data Center Access to the data center is restricted to authorized employees via a computerized key card system. External doors to the building are locked at all times and require entry by the key card system. Guards are on duty 24 hours a day and monitoring multiple video cameras and intruder alert systems. Internal security zones further restrict access with a “mantrap,” biometric access systems, and caged server areas. Also, temperature, humidity, power management, smoke detection, and fire suppression controls are all in place at the data center to manage environmental risks. We have implemented a defense in-depth strategy with redundant firewalls, DMZ network security architectures, identity and access management controls, intrusion detection systems and anti-malware solutions. Also, Vertafore’s internal information security team runs weekly vulnerability assessment scans to search for, and remediate potential network and host security exposures. Applications Development Vertafore has separate development, QA, staging, and production environments, and performs periodic testing for OWASP’s top ten web application security vulnerabilities (e.g., XSS, SQL Injection, CSRF, Directory Traversal, etc.). Our applications facilitate customer use of common application user ID and password control parameters, password encryption, and SSL 128-bit encryption. Also, host level logical access is limited with system controls designed to enforce authentication, authorization, and accountability requirements such as the use of two-factor authentication, unique administrator accounts, and the removal of default accounts. With regard to security monitoring and incident management, production systems have 24/7 monitoring, alerting and response to significant security events with assistance from a well-known managed security service provider. 3rd Party Assessments Annual Service Organization Control reports (formerly known as ‘SAS70’) are prepared by a top accounting firm. This report confirms our effective deployment of standard security measures for our hosting center and applications. Vertafore has consistently passed the SOC audits. The controls tested as part of the SOC audits include: • Infrastructure Change Management • Application Change Management • Physical Access • Logical Access • Data Processing • Operations Recovery We also have a third-party security firm performing additional technical security testing on quarterly and annual schedules. They test the effectiveness of: • Data center security policies, procedures and processes • External network security—including email, and antivirus security • Internal network security—including wireless, phone, and workstation security • Physical security For more information, please contact your Vertafore Account Manager at 800.444.4813 or visit vertafore.com. © 2014 Vertafore, Inc. and its subsidiaries. All rights reserved. Trademarks contained herein are owned by Vertafore, Inc. This document is for informational purposes only. Vertafore makes no warranties, express or implied, with respect to the information provided here. Information and views expressed in this document may change without notice. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. VAM.DS.DCHE.1114 vertafore.com | 800.444.4813
© Copyright 2026 Paperzz