All security telemetry is transmitted to our SIEM via TLS encryption.
Encryption-at-Rest
Data transmitted to our SIEM is encrypted-at-rest with a data key using the industry-standard AES-256 algorithm.
MFA Enforcement
Multi-factor authentication is enforced company-wide for all systems and applications.
Hardware Tokens
Hardware security-token is enforced for own analysts on all SOC platform tools processing customer data.
Penetration Testing
We regularly validate our security posture through annual penetration testing.
AICPA SOC 2® Type II
The Systems and Organization Controls 2 Type II certification demonstrates the highest level of customer-data security over a sustained duration of auditing.
Zero Trust Architecture
We leverage leading Zero Trust concepts like those outlined in Google’s BeyondCorp initiative and strive to be on the cutting edge of enterprise security so we can advise our customers accordingly.