Recon InfoSec
Contact Us
Recon InfoSec

Our Security Practices

Encryption-in-Transit

All security telemetry is transmitted to our SIEM via TLS encryption

Encryption-at-Rest

Data transmitted to our SIEM is encrypted-at-rest with a data key using the industry-standard AES-256 algorithm

MFA Enforcement

Multi-factor authentication enforced company-wide for all systems and applications

Hardware Tokens

Hardware security-token enforced for own analysts on all SOC platform tools processing customer data

Penetration Testing

We endure annual penetration testing to ensure we are consistently meeting the highest security posture

AICPA SOC 2® Type II

The Systems and Organization Controls 2 Type II certification demonstrates the highest level of customer-data security over a sustained duration of auditing.

Zero Trust Architecture

We leverage leading Zero Trust concepts like those outlined in Google’s BeyondCorp initiative and strive to be on the cutting edge of enterprise security so we can advise our customers accordingly.

chevron-down