Many of our users are wondering how their data is protected and how we are fighting hacking attempts.
Our team of developers are dedicated to making Shadow's security as efficient as possible.
What is the protection protocol for Shadow today?
Certain protections already exist because Shadow is hosted on one of our data centers (we will go into more detail about that later) but additional to that, Shadow is among other things, protected by two features:
. We use an IP address filtering system
. We also use a proprietary protocol for Blade called the "SUFP"
Even if an individual with ill intentions was able to steal data, he would then have the additional challenge of "interpreting" them in order to use them.
We have essentially created a "tunnel" system between the data center and your Shadow. On the same principle of a VPN, it provides secure browsing. It will be possible to activate or deactivate it because this solution is intended to add an additional layer of protection when accessing confidential data such as your banking information or your passwords.
Soon, we will also create a single-key encryption channel each time you log in. With this new system, your data will be encrypted with an SSL certificate.
Shadow Vs the World?
As we mentioned earlier, the difference from a traditional PC is that a Shadow is hosted in our data centers. This means that a network team and infrastructure professionals are on standby and have much better control tools and protections than the average user.
In the case of an attempt to hack into our data centers, the intruder will have to go through our multiple firewalls and will be detected by Blade. This alerts us to take the next necessary steps.
Additionally, thanks to our IP address filtering system, they would have to target a specific Shadow which makes the task much more difficult for a potential intruder.
What are the guarantees against the hacking of my account?
On Shadow, you keep control of security and antivirus, as with a conventional PC. In regards to the risk of leaks from one user to another, each user of Shadow has its own environment, isolated from other users by recognised components, with its own hardware.
In addition, your Shadow runs on servers located in Europe and USA, managed by a dedicated team 24/24 and secured with the same technologies as those used by banks. Effective cyber attack protections are also in place in the data centers (firewall against DDOS attacks and others).
Your data in our data centers is therefore much better protected than at home.
Can you see what I'm doing on Shadow?
Only users have access to their computer and they alone know what they put on their computer. You have access to the data in your service. On the other hand, of course, our system monitors the use of the server's hardware components, especially to control the temperature or power consumption of the data center.
Where is the data stored?
In dedicated, secure data centers in Europe for European Users and in United States (Santa-Clara, Dallas, New York. We are therefore subject to the French regulations on data protection.
Can I permanently delete all my stored data?
Yes, just as you would on a classic computer. Conversely, we are thinking about an optional service to recover data if you accidentally erase everything.
Still have questions after reading this article? Contact us for assistance!