Network redundancy access
Firewall filters illegal requests
Third-party anti-DDOS service
URL data access security code technology
Server security certificates, etc.
Login & operation log audit
Abnormal login alerts
Strict tenant isolation & permission control
Complete data backup mechanism
Remote disaster recovery data center