How safe is UIAS™?

UIAS™ employs proprietary encryption algorithms, hardened operating systems, hybrid databases configured with leading-edge object oriented relational database management systems and retro-db systems over unique diverse proprietary communications protocols that do not support remote access to guarantee a hack-proof system (UIASVault™).  These features are in addition to the usual security features employed by all highly secure systems, like multiple firewalls, global load balancing equipment, switch based HTTP access, secure socket layer, digital certificates, data upload via firewalled VPN networks, middleware hardware isolating the main systems from Internet access, global co-location, database synchronization and the unique on-line UIASSync™ database checksum validation system.  This protects UIAS™ from would be hackers and perpetrators of fraud.