ReferralCycle is a referral and sales network manager that connects you with your partners. Coordinate opportunities from people, sites, and more in one place!
  Security
Cycle Systems incorporates many processes and procedures to protect their network and application systems and environment. These processes and procedures are reviewed frequently and updated as needed. Our systems are protected by multiple and redundant firewalls that are monitored 24 hours a day. Plus, production systems are accessed by multi-step/multi-layer encrypted VPN administrator access. We perform all maintenance on our production servers. All application and database hardware systems utilize redundant storage systems, redundant power supplies (that are connected to separate circuits), and other redundant systems. All user activities tied to our networks are conducted via Secure Sockets Layer (SSL) technology. Collected sensitive/actionable information is encrypted. Meaningful user usage is only available via multiple password protection schemes and methodologies including strong 8+ character alpha numeric passwords, complex usernames, previous password restrictions, selectable password expiration time frames, multiple challenge questions, instant team expirations, and many others. More expansive security information is available.

Signup Now - our free personal accounts take only 90 seconds to setup and use!

copyright Cycle Systems, Inc. all rights reserved
Quick Tour Why Us Comparisons Free Account Security Back to Home Page
All of our application and database hardware systems are hosted in a SAS 70 Type II and SSAE16 audited 99.999 percent environment. This environment has 24-hour physical security and network monitoring by on-premises staff, redundant generators and power sources, redundant network feeds, and other redundant systems.