How Secure Is My Data?

The Robbins Geller Portfolio Monitoring Program® is managed by an in-house team of professionals, including analysts and accountants, who provide comprehensive monitoring of securities, bonds and other investments. Additionally, the program’s technical features offer a wide range of security, including physical security, network security and operating security.

Highlights of Security Measures Adopted by
Robbins Geller Portfolio Monitoring Program®

   

The comprehensive list of security measures for the Portfolio Monitoring Program® includes:

Physical Security

  • The Firm's Portfolio Monitoring data is stored at the AIS Data Center in San Diego, California. It is an SSAE 16-compliant, SOC 1, 2, and 3 audited facility that features an impressive 9.1 Megawatts of power, N+1 or better redundancy on all data center systems, and security protocols required by leading businesses in the most stringent verticals. Originally designed to support a large defense contractor, it is built to rigorous standards, complete with redundant power and cooling systems, plus multiple generators.

Network and Login Security

  • Firewall technology with Cisco ASA hardware
  • Stateful packet inspection technology
  • Adaptive security algorithm (ASA)
  • Private internet addressing
  • UNIX® operating system with additional firewalling
  • Secure login over HTTPS

Operating System Security

  • Web server using Secure Socket Layer (SSL)
  • Remote administration using Secure Shell (SSH)
  • Frequent security audits
  • Follow-up security on each server with best practices to prevent exploits and limit exposure

Virtual Private Networking

  • Access to data center via Cox Communications Fiber Optic Network (TLAN)
  • 128-bit encryption (3DES) – Highest level used by government and financial institutions

Login Authentication

  • Each authorized user logs in with an individual password
  • Passwords are changed on a frequent basis
  • Passwords use MD5 encryption to prevent accidental exposure

Security Audit & Reporting

  • Servers scanned routinely for vulnerabilities by Qualys
  • Latest vulnerabilities are compared to our current system for an urgency rating