How Secure Is My Data?

The Robbins Geller Portfolio Monitoring ProgramSM is managed by an in-house team of professionals, including analysts and accountants, who provide comprehensive monitoring of securities, bonds and other investments. Additionally, the program’s technical features offer a wide range of security, including physical security, network security and operating security.

Highlights of Security Measures Adopted by
Robbins Geller Portfolio Monitoring ProgramSM


The comprehensive list of security measures for the Portfolio Monitoring ProgramSM  includes:

Physical Security

  • Secure data center at redIT in San Diego, California
  • redIT is protected by a sophisticated closed-circuit television system, a long-term digital storage system for video surveillance, and a state-of-the-art bio-metric scanner access and security
  • Keyless access to server cabinets offers proactive management allowing remote monitoring and logging of personnel access
  • 24-hour data center operators get notification of security breaches, and monitoring of cabinet door latches
  • The FM-200 system is designed to extinguish a fire in ten seconds or less, potentially saving millions of dollars in equipment, valuable assets, and lost production time

Network and Login Security

  • Firewall technology with Cisco ASA hardware
  • Stateful packet inspection technology
  • Adaptive security algorithm (ASA)
  • Private internet addressing
  • UNIX® operating system with additional firewalling
  • Secure login over HTTPS

Operating System Security

  • FreeBSD – software developed by the University of California, Berkeley and its contributors
  • Web server using Secure Socket Layer (SSL)
  • Remote administration using Secure Shell (SSH)
  • Frequent security audits
  • Follow up security on each server with best practices to prevent exploits and limit exposure

Virtual Private Networking

  • Access to data center via Cox Communications Fiber Optic Network (TLAN)
  • 128-bit encryption (3DES) – Highest level used by government and financial institutions

Login Authentication

  • Each authorized user logs in with an individual password
  • Passwords are changed on a frequent basis
  • Passwords use MD5 encryption to prevent accidental exposure

Security Audit & Reporting

  • Servers scanned nightly for vulnerabilities by Qualys
  • Latest vulnerabilities are compared to our current system for an urgency rating