Data Protection

We take security seriously at Motiva AI. Here’s a brief look at how.

Data Center Security

Motiva AI’s SaaS platform is hosted at a Tier 1 data center of the world’s leading cloud services provider. Our hosting partner has multiple global certifications including, but not limited to, SOC1/2/3, ISO27001, SSAE 16 and EU/US Safe Harbor. Their data center and hosting services provide the following security measures:

  • Physical access is strictly controlled by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means.
  • Two-factor authentication multiple times to gain physical access to data center facilities.
  • State-of-the-art fire detection and suppression.
  • Advanced power, climate, and temperature management and controls.
  • Redundant internal networks.
  • Fully redundant electrical power systems maintainable without impact to operations, 24 x 7.
  • Uninterruptible Power Supply (UPS) units provide back-up power in the event of electrical failure for critical and essential loads in the facility. Generators provide back-up power for the entire facility.

Network Security

  • Designated, dedicated and controlled network that is fully separated from the public Internet.
  • Our network model implements multi-tiered subnets to segregate web, application and database traffic.

Secure Data transmission & Session Management

  • Data transmission encrypted using SSL 3.0 / TLS 1.2.
  • User sessions are tokenized during the login; each transaction is verified using session tokens
  • Data is fully encrypted in transit and at rest.
  • Storage is in a private VPC that is inaccessible from the public Internet.

Tapeless Backup & Recovery

  • Operational, Customer and IP data is backed up regularly and periodically tested.
  • Electronic backup to redundant data centers allows full restoration of customer and application data.
  • Tapeless (disk to disc) backup provides additional security.

Security Monitoring and Assessments

  • We evaluate application and network vulnerabilities on a regular basis.
  • We monitor notifications and alerts from various sources to continually assess and remedy potential security risk.