Security is never enough and you can never get enough of security. Security has been embedded in our core principles and it reflects in the architectural choices that we have made. We have built the Grid where Security is embedded in both usability and accessibility. System On Grid provides an array of security options and tools to provide you and your organization with a very safe and secure environment. The grid constantly strives to keep up with the ever evolving threat environment by leveraging open source security concepts and models.
System On Grid provides the latest state of the art features with high
automation and availability.
A web experience which uses end-to-end SSL encryption to keep your sensitive data secure.
Chose SSH keys instead of passwords to access your resources.
Quantum dashboard that uses SSL encryption to interact with your Orbits and Storage.
Leverage 2-Factor authentication and protect your account against unauthorized access.
Access the Grid API securely using long term keys and perform automation tasks securely.
Browser Based Shell
SSH to your resources directly from browser by using SSH embedded in SSL.
Get console access directly from browser and perform tasks remotely and safely.
See who logged in from which IP in your dashboard.
Account History And Notifications
Check the history of all actions taken and get important notifications via Email and Text.
How Safe is Your Website?
System On Grid website accessed at https://systemongrid.com uses SSL encryption end-to-end with HSTS. All sensitive data in the backend database is encrypted with a very efficient key management algorithm. The website is also protected by DDoS and other attacks and is cached across multiple locations, for an efficient, secure and fast experience.
2-Factor authentication adds an additional layer of challenge on top of the traditional username and password. If 2-Factor authentication is enabled, the website will first ask you username and password. Once that authentication is successful, it will do an additional challenge by sending a code via Text, Email or OAUTH token. This is the second level of authentication and is highly secure, as the system only sends the code to email address or cell phone number present on file. Looking at the message with the code, you can know whether its you who initiated the authentication or if your password is compromised and someone else is trying to break into your account prompting corrective action of password reset.
Why Log the IP?
By logging IP we keep track of authentication requests. By comparing it with previously logged IPs we look for anomalies. If an authentication anomaly is triggered by an authentication request for your account being received by a completely different IP address than that on file, we immediately initiate a 2-factor authentication. In such a scenario, if you have not already.
Did I really do that?
The dashboard maintains a log of all historical actions taken in your account with precise timestamps. This allows you to review and ensure that all actions were taken by your or somebody else authorized by you. This is a good place to audit for any unauthorized actions.