Recon InfoSec
Contact Us

Our Security Practices

Encryption-in-Transit

All security telemetry is transmitted to our SIEM via TLS encryption.

Encryption-at-Rest

Data transmitted to our SIEM is encrypted-at-rest with a data key using the industry-standard AES-256 algorithm.

MFA Enforcement

Multi-factor authentication is enforced company-wide for all systems and applications.

Hardware Tokens

Hardware security-token is enforced for own analysts on all SOC platform tools processing customer data.

Penetration Testing

We regularly validate our security posture through annual penetration testing.

AICPA SOC 2® Type II

The Systems and Organization Controls 2 Type II certification demonstrates the highest level of customer-data security over a sustained duration of auditing.

Zero Trust Architecture

We leverage leading Zero Trust concepts like those outlined in Google’s BeyondCorp initiative and strive to be on the cutting edge of enterprise security so we can advise our customers accordingly.
chevron-down