The hubnet servers are housed on AWS in Oregon US. It has been audited and deemed compliant based on an evaluation of our entire system, including processes, procedures and controls.



The basic key elements for the security of hubnet

  • Customer data is hosted through Amazon Web Services in Oregon US
  • HTTPS Encryption on all data between the hubnet’s server and the client’s web browser. User cannot login without encryption.
  • Hubnet’s servers are firewalled and only the customer’s servers the are required to be running are listening.
  • Connections between servers are made using encrypted secure tunnels
  • hubnet employees do not access customer data without prior customer consent.
  • All accounts are private to each customer
  • All data is backed up nightly
  • Regular security audits are carried out by hubnet’s internal security team.

Network Securiry

Secure Network Architecture

These boundary devices employ rule sets, access control lists (ACL), and configurations to enforce the flow of information to specific information system services.

Access point 

AWS has strategically placed a limited number of access points to the cloud to allow for a more comprehensive monitoring of inbound and outbound communications and network traffic.

These customer access points are called API endpoints, and they allow secure HTTP access (HTTPS), which allows you to establish a secure communication session with your storage or compute instances within AWS. To support customers with FIPS cryptographic requirements, the SSL-terminating load balancers in AWS GovCloud (US) are FIPS 140-2-compliant.

In addition, AWS has implemented network devices that are dedicated to managing interfacing communications with Internet service providers (ISPs). AWS employs a redundant connection to more than one communication service at each Internet-facing edge of the AWS network. These connections each have dedicated network devices.



Transmission protection

You can connect to an AWS access point via HTTP or HTTPS using Secure Sockets Layer (SSL), a cryptographic protocol that is designed to protect against eavesdropping, tampering, and message forgery.

For customers who require additional layers of network security, AWS offers the Amazon Virtual Private Cloud (VPC), which provides a private subnet within the AWS cloud, and the ability to use an IPsec Virtual Private Network (VPN) device to provide an encrypted tunnel between the Amazon VPC and your data center. For more information about VPC configuration options, refer to the Amazon Virtual Private Cloud (Amazon VPC) Security section below

Fault-Tolerant Design

AWS’ infrastructure has a high level of availability and provides you with the capability to deploy a resilient IT architecture. AWS has designed its systems to tolerate system or hardware failures with minimal customer impact.


Physical and Environment Security

  • Fire Detection and Suppression
  • Power - fully redundant and maintainable without impact to operations, 24 hours a day
  • Climate and Temperature - systems monitor and control temperature and humidity at appropriate levels.
  • Management - electrical, mechanical, and life
  • Storage Device Decommissioning - decommissioning process that is designed to prevent customer data from being exposed to unauthorized individuals.

See results from the act of collaboration

Meaningful collaboration starts with hubnet, a premier pathway to success.

Enter your keyword: