We are here to help!

Find new ways to use Atera, Ask us anything.


Ensuring Privacy and Security in the Atera Cloud

Atera understands that the confidentiality, integrity, and availability of our customers' information are vital to their business operations and our own success. We use a multi-layered approach to protect that key information, constantly monitoring and improving our application, systems, and processes to meet the growing demands and challenges of security.

Secure Data Centers
Our service is deployed in Microsoft Azure top-tier data centers. These facilities provide carrier-level support, including:

Access control and physical security

  • 24-hour manned security, including foot patrols and perimeter inspections
  • Biometric scanning for access
  • Dedicated concrete-walled Data Center rooms
  • Computing equipment in access-controlled steel cages
  • Video surveillance throughout facility and perimeter
  • Building engineered for local seismic, storm, and flood risks
  • Tracking of asset removal

Environmental controls

  • Humidity and temperature control
  • Redundant (N+1) cooling system


  • Underground utility power feed
  • Redundant (N+1) CPS/UPS systems
  • Redundant power distribution units (PDUs)
  • Redundant (N+1) diesel generators with on-site diesel fuel storage


  • Concrete vaults for fiber entry
  • Redundant internal networks
  • Network neutral; connects to all major carriers and located near major Internet hubs
  • High bandwidth capacity

Fire detection and suppression

  • VESDA (very early smoke detection apparatus)
  • Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression

Secure Transmission and Sessions
Connection to the Atera environment is via SSL/TLS cryptographic protocols, using global step-up certificates, ensuring that our users have a secure connection from their browsers to our service.
Individual user sessions are identified and re-verified with each transaction, using a unique token created at login.C

Login IP Restrictions in Atera
Login IP Ranges limit unauthorized access by requiring users to login to Atera from designated IP addresses — typically your company network, designated customer networks or VPN. By using Login IP Ranges, admins can define a range of permitted IP addresses to control access to Atera. Those who try to login to Atera from outside the designated IP addresses will not be granted access. Learn how to implement this feature here.

Two-Factor Authentication
Two-Factor Authentication requires that all login attempts have both login credentials and a second authentication factor. This is achieved by enabling the capability under the Admin configuration. Login attempts that do not have valid credentials from both sources will not be granted access to Atera. Learn how to implement this feature here.

Network Protection
Perimeter firewalls and edge routers block unused protocols within the Azure environment
Internal firewalls segregate traffic between the application and database tiers
Intrusion detection sensors throughout the internal network report events to a security event management system for logging, alerts, and reports

Disaster Recovery
The Atera service performs real-time replication to disk at each data center, and near real-time data replication between the production data center and the disaster recovery center

Data are transmitted across encrypted links

Disaster recovery tests verify our projected recovery times and the integrity of the customer data

Atera tests all code for security vulnerabilities before release, and regularly scans our network and systems for vulnerabilities.

Agent Security
Once an Agent is deployed, a unique Key is assigned to it, this key is being used for authentication purposes. All communications between Agents and Atera’s Cloud are verified by this unique Key and conducted via secure socket layer/transport layer security (SSL/TLS)

Database Security
Hardware and software configurations are designed to provide secure logical separations of customer data that permit each customer to view only its related information.
Multitenant security controls include unique, non-predictable session tokens, configurable session timeout values, password policies, sharing rules, and user profiles.

All customer data within the Atera Database is encrypted with a 256bit encryption protocol.

Remote Control Tunneling
While using the Atera Remote Control tool a virtual tunnel is created between the Atera user and the target computer. All data transferred between the User and the Agent is encrypted. Both the Atera User & Agent are limited to connecting using UDP port 443.

Was this article helpful?
4 out of 4 found this helpful
Have more questions? Submit a request