Enhanced security as data is transferred and stored using 256-bit AES encryption with a user-defined key

Data security is our topmost priority. At IBackup, we are committed to protect your valuable data with our stringent information security policies, state-of-the-art data centers, and military-grade encryption – as used by US government, security agencies, and leading banks for data confidentiality. Our multiple world-class data centers host the IBackup application and store your data. We follow industry leading practices to ensure comprehensive data protection.

Logical security

Your data is encrypted with 256-bit AES encryption on transfer and storage. On sign up, provide your private encryption key (known only to you and not stored anywhere on our servers) or opt for the default encryption key. We recommend that you choose your own private encryption key to maintain utmost data confidentiality.

All browser-based data transfer operations including sharing of files and folders use 128-bit SSL encryption.

Physical security

The IBackup application is hosted at our data centers in the United States. The data centers are designed with raised floors, HVAC temperature control systems with separate cooling zones and seismically braced racks. Security feature include smoke detection and fire suppression systems, motion sensors, 24/7 secured access, video camera surveillance and security breach alarms.

Network security

We have periodic third party reviews of our network infrastructure to check for known application and service vulnerabilities.

Redundant backups

Your data resides on RAID-protected storage devices. We strongly recommend that you keep a local backup of your data, and our desktop clients now support encrypted local backups with private key option. Online Backup should be a complementary solution to local backup and not be the ONLY solution for disaster recovery.

Important Note:
IBackup DOES NOT store your private encryption key on the servers. We recommend that you archive it safely for future use, as without it you will be unable to decrypt and restore the data.