01101001 10110100
databasemart.com

Database Mart Security
& Reliability Assurance

We implement a multi-layered security framework—from data center infrastructure to server and platform access controls—to ensure the stability of your services and the protection of your data.

Data center and hardware infrastructure security
Server and network-level protection
Platform access and account security
Continuous monitoring and risk control

Data Center & Physical Security

Our infrastructure is hosted in U.S.-based data centers and is supported by standardized physical and environmental security measures.

Data Center Infrastructure
Certifications
SOC 2 Type II ISO 27001
Physical Security
  • Strict facility access control mechanisms
  • On-site monitoring and server security management
  • Redundant power systems and backup power support
  • Advanced temperature control and environmental management systems
  • Our Dallas data center complies with industry-recognized certifications, meeting international security and compliance standards.
  • Hardware & Environment
    • Servers operate within a stable hardware environment with continuous monitoring
    • Hardware performance and status are maintained within controlled parameters
    • Foundational operational support ensures long-term stability and reliability
    These measures provide a stable physical environment for server operations and reduce the risk of disruptions caused by external factors.

    Network-Level Baseline Protection

    At the server level, we provide baseline protection through operating system and network-level strategies.

    Hardware firewall or routing-level protection based on service type
    Servers use non-standard ports by default
    Common high-risk ports are blocked by default
    Basic system and network performance monitoring
    Backup support available based on service configuration
    PVLAN isolation between dedicated servers to effectively prevent cross-server contamination
    These measures help mitigate common network attacks and reduce risks associated with system vulnerabilities.
    PVLAN Isolation Architecture
    Internet / Uplink Hardware Firewall Core Switch PVLAN ISOLATED ZONE Server A Server B Server C Isolated — no lateral traffic Blocked

    Platform & Account Security

    For platform access and account management, we implement standardized authentication and access control mechanisms:

    Two-Factor Authentication (2FA)
    Support for two-factor authentication (2FA)
    Anomaly Detection
    Abnormal login detection and access restriction mechanisms
    Verification Codes
    Verification codes required for login and critical operations
    Full HTTPS Encryption
    Full HTTPS encryption for control panel access
    Access Control & Permissions
    Account-based access control and permission management
    These mechanisms reduce the risk of unauthorized access and help protect account integrity and operational security.

    Your Data Stays Under Your Control

    We prioritize the data security and controllability of user data and implement multiple measures to reduce the risk of data loss or leakage:

    Backup support (based on service configuration) for data recovery and business continuity
    No proactive access, scanning, or analysis of user data content unless required by law or necessary for service delivery
    Full user control over data, with complete management authority retained by the customer
    Strict internal access controls for maintenance personnel, including restricted server access and dual authentication for key-based access
    These measures help ensure baseline security during data transmission and storage while minimizing common risks.
    YOUR DATA Customer ✓ Access DatabaseMart ✕ No Access Customer has full access DatabaseMart cannot access your data

    Monitoring & Continuous Improvement

    Live Infrastructure Monitor
    Network Traffic ONLINE All Systems 99.9% Uptime SLA Infrastructure Network Security 24 / 7 Monitoring
    System & Network Monitoring
    Basic system and network monitoring
    Security Strategy Optimization
    Ongoing optimization of infrastructure and server security strategies
    Technical Support
    Technical support available when necessary to assist with issue diagnosis
    Through continuous operations and maintenance, we help users identify and address potential risks in a timely manner.

    Clear Boundaries, Shared Accountability

    To ensure comprehensive security, we clearly define the responsibility boundaries between our platform and our users:

    Platform Layer
    We are responsible for:
    • Data center and hardware infrastructure security
    • Network-level protection and baseline access control
    • Platform access and account system security
    Application Layer
    You are responsible for:
    • Security configuration of the operating system and applications
    • Proper management of passwords and access credentials
    • Application-level security and compliant data usage
    • Performing regular backups and ensuring data integrity
    A clear division of responsibilities helps both parties maintain a stable and secure operating environment.

    Strengthen Your Security Posture

    In addition to platform-level protections, we recommend the following best practices to further enhance your overall security:

    01
    Use strong passwords and update credentials regularly
    02
    Enable verification codes or multi-factor authentication where applicable
    03
    Keep your operating system and applications up to date with the latest patches
    04
    Properly configure firewalls and open ports, avoiding unnecessary exposure
    05
    Perform regular data backups and verify their integrity and availability
    06
    Avoid storing or transmitting sensitive information in untrusted environments
    Adopting strong security practices can significantly reduce most common risks.

    Responsible Disclosure Program

    We value feedback from security researchers and users, and we welcome the responsible disclosure of potential security issues.

    If you identify any vulnerabilities that may affect our platform, network, or services, please contact us and provide:

    1
    A detailed description of the issue, including reproduction steps and potential impact
    2
    Avoidance of destructive testing or actions that may disrupt normal service operations
    3
    Non-disclosure of the vulnerability until it has been confirmed and resolved

    We will promptly review and assess all reports and will maintain communication with you as needed throughout the process.

    Security Support
    If you have advanced security requirements—such as enhanced firewall configurations or custom network policies—please contact our technical team for further assistance.

    More Security FAQs

    Which TCP ports are blocked on the server?
    For security reasons, the following TCP ports are blocked on our network:
    135–139, 445, 593, 1024–1030, 1080, 1214, 1363–1364, 1368, 1373, 1377, 2283, 2535, 2745, 3127–3128, 3410, 4444, 5554, 8866, 9898, 10000, 10080, 12345, 17300, 27374, 3333, 4444, 14444, 33333, 2222, and 22222.
    Do you access my server or data?
    We do not access customer data unless required for maintenance, troubleshooting, or legal compliance, and strict access controls are enforced.
    Do you monitor servers for security threats?
    We provide basic infrastructure and network monitoring. Customers are responsible for implementing application-level monitoring and security measures.

    For more detailed information, please visit our full FAQ section.