CxAlloy is committed to maintaining the confidentiality, integrity and security of any personal information about our users or their projects. Questions or security concerns? Email and we will respond promptly.

Trusted and Proven Physical Security

The data centers where CxAlloy is hosted use keycard protocols, biometric scanning protocols, access logging, and round-the-clock surveillance. Only authorized personnel are granted access and undergo multiple and thorough background security checks.

Encryption & Dedicated Infrastructure

Customer data for all accounts are accessed via secure protocols such as HTTPS and SSH. Additionally, all passwords are encrypted on our servers and databases. All software is updated regularly to ensure the latest security patches.

Rigid Employee Policies

The best security can be compromised without proper policies. At CxAlloy, only a select few have access to the servers where data is stored. We go to great lengths to ensure the right balance between support and a secure infrastructure.

Redundant Environment

CxAlloy is backed by robust redundancy to avoid and recover from failure. All our data centers employ backup generators and redundant external power sources. Redundant internet connectivity is provided to maximize network uptime.

Data Protection & Backups

CxAlloy TQ customer data is replicated with sub-millisecond latency to secondary data centers in separate regions. In addition, our platform performs daily backups of all CxAlloy databases. These backups are cycled out in accordance with best practices, ensuring that we always have at a minimum a recent backup (within the last day), backups within the week, and backups within the month. These backups are then stored in separate data centers from both our primary and secondary data centers.