All security telemetry is transmitted to our SIEM via TLS encryption
Encryption-at-Rest
Data transmitted to our SIEM is encrypted-at-rest with a data key using the industry-standard AES-256 algorithm
MFA Enforcement
Multi-factor authentication enforced company-wide for all systems and applications
Hardware Tokens
Hardware security-token enforced for own analysts on all SOC platform tools processing customer data
Penetration Testing
We endure annual penetration testing to ensure we are consistently meeting the highest security posture
AICPA SOC 2® Type II
The Systems and Organization Controls 2 Type II certification demonstrates the highest level of customer-data security over a sustained duration of auditing.
Zero Trust Architecture
We leverage leading Zero Trust concepts like those outlined in Google’s BeyondCorp initiative and strive to be on the cutting edge of enterprise security so we can advise our customers accordingly.