Skip to content

Cloud Service Provide: Azure

Azure is our primary CSP partner, and it has CSP certification (SOC, ISO)

With Microsoft Azure's open and flexible cloud computing platform, you can invent with purpose, save money, and improve your organization's efficiency.

The service is delivered through CSP data centers. As of now, the platform allows clients to select their host region from our listed supported regions. As long as CSP and required cloud services are available in the customer-specific regions, we can support new regions based on customer needs.

Supported Region: Asia, *Europe, and *US (* on request) 

Reliability

  • Backup and Restore: Azure Cloud-based platform performs a comprehensive backup of each customer's data on a regular basis to reduce the risk of data loss in the case of the main data failure. Backups are kept secured in distinct production systems, and recovery operations are examined on a regular basis. 

  • Region redundancy: Failure tolerance is achieved through redundancy and logical isolation of Azure services. The data accumulated in the primary region's zone-redundant storage is configured to meet the cloud service provider's durability requirements, which are at least 99.9999999999 percent (12 9's) over a year.

Hosting

Customers can choose the region for the data centers that house and process their data with  Azure Cloud hosting.

  • Data Center Security: Microsoft Azure runs in datacenters managed and operated by Microsoft (cloud service provider). These geographically dispersed datacenters comply with key industry standards, such as ISO/IEC 27001:2013 and NIST SP 800-53, for security and reliability. The datacenters are managed, monitored, and administered by Microsoft operations staff. The operations staff has years of experience in delivering the world’s largest online services with 24 x 7 continuity.

  • Data Destruction Overview: Cloud service provider Microsoft follows strict standards for overwriting storage resources before their reuse, as well as the physical destruction of decommissioned hardware. Microsoft executes a complete deletion of data on customer request and on contract termination. Cloud service provider Microsoft has data-bearing device (DBD) guidelines, policies, security requirements, and procedures for handling and management of DBDs within Microsoft datacenters(ref link).

  • Network Security: Application firewalls are configured to protect Zealbeez gateways from network security risks. We use threat detection software to spot unusual traffic patterns, and we run regular automated network security scans across our IP range.  A hot patching system is also in place to keep up with the latest security updates where it is applicable. Our applications and networks are subjected to an annual penetration test by a third-party company.

Application

Customers can choose the region for the data centers that house and process their data with  Azure Cloud hosting.

  • Availability and Accessibility: Meet your target data availability with Zealbeez.Our web accessibility program is intended to provide a welcoming, comprehensive, and integrated user experience. Zealbeez is gradually implementing the Web Content Accessibility Guidelines to help customers.

  • Device Support: We provide a web-based tool that is compatible with all major browsers, including Microsoft Edge, Firefox, Chrome, and Safari, as well as iOS and Android browsers. It's a modern web framework-based portal that adheres to progressive web app standards for a better mobile experience.

  • Low-Risk Design: Zealbeez's software creates a completely separate logical instance of the application for each customer. We can easily identify defects before most customers report them as we have a shared coding standard for multiple customers. We can also provide prompt updates without the risk of mixing data from different customers. Your data is always secured by robust encryption, either in transit from your browser to our server or at rest in critical applications.

  • Role-Based Access Control: At Zealbeez, security access is based on performance, with single sign-on and multi-factor authentication (MFA). Active user sessions can be observed and terminated by system administrators. Customers get a business application security experience with features like IP access controls, hardware-based authorization, and field-specific encryption for sensitive data.

  • Audit logging: Zealbeez Audit logging collects user logs based on history, successful and failed login attempts, data variations in stores, pipeline system updates, and security settings modifications.

  • Third-Party Inspection: Our application and network are committed to a biannual penetration test from a Payment Card Industry (PCI) certified third-party security firm periodically. At any moment, our clients can request access to these statistics. Customers can employ themselves or a third party to conduct VAPT scan execution to validate platform security on a request and approval basis.