Reliability you can count on
Bernard’s mission-critical applications and platforms are configured as a distributed grid. We have essentially eliminated the concept of a single point of failure while also minimizing the impact of any type of failure.
Mission-critical components are protected by hot fall-over, while other components are highly distributed to ensure that any failure that occurs has low service impact.
Rock solid contact center and subscriber management solutions
Robust Telephony Backbone
We offer multi-carrier termination with redundant connectivity, eliminating downtime that could be caused
by carrier outages.
Geographically Redundant Data Centers
We use active-active configuration, providing redundant operation centers for any disaster recovery.
Measured end-to-end, our uptime is as high as 99.99%.
Since 1989 we have been working with the top companies in America to provide the highest level of service possible. Get in touch and one of our reps can help figure out the solutions you need. Talk with us.
we keep your data safe with a multi-layered approach to security
Working with some of the largest companies in America brings stringent security requirements. Each year our technology partners collect millions of credit card numbers, bank account numbers and social security numbers. To protect this information we use a multi-layered infrastructure that meets and exceeds industry security requirements.
Our contact center and billing system security include:
- Independent Certification
- Physical Security
- Network Security
- System and Application-Level Security
- Data Security
- Agent-Level Security
- Industry Security Certifications and Membership
- SAS 70 and Sarbanes-Oxley Certifications
Stringent security standards
At Bernard we secure all cloud infrastructure using the standards and best practices established by the ISO 27001/27002, COBIT, PCI-DSS, Type 2 Soc 2, and Cloud Security Alliance (CSA).
Our data centers are regularly audited using the SSAE 16 (previously SAS 70) standard, which means we use stringent security and continuity controls such as two-factor building access (badge and biometrics), 24/7 on-site security, video monitoring, and more.
We also use process safeguards to ensure that employee access is controlled appropriately.