Trust & Security

We combine enterprise-class security features with comprehensive audits of our applications, systems, and networks to ensure customer and business data is always protected.

Certifications

SOC2 Type II Certification for Security and Confidentiality for our software platform.

AT101 Type II Certification to assess the suitability of design of controls for our software engine.

Protection

Hosted on Microsoft Azure’s industry-compliant cloud of geographically distributed data centers, operating 24x7x365 and designed to withstand natural disasters.

Protected by best-in-class firewall and router technology, TLS encryption and a network intrusion detection system.

Custom security policies allow variable password length and complexity, aging and history standards and account lockout and unlock requirements.
Configurable IP restrictions to control access to specific IP addresses.

Encrypted using industry standard TLS in conjunction with Azure SQL Transparent Data Encryption (TDE).

Backed up with Azure’s real-time automated backup system and secondary data center geo-replication in the event of a fail-over.

Access Proxy monitors all interactions between the user and the platform, and enforces the client data partition in addition to all associated user rights established from the corresponding Security Profile.
Ability to authenticate users via native SAML 2.0 Identity Providers such as ADSF and Ping Identity.
|

When you can confront real issues by being available, transparent and responsive, you’re putting trust at the core of your customer’s experience.

Chris NelmsChris Nelms, CISSP, CISM, CRVPM, SEC+
VP Information Security

|

Trust in a vendor isn’t guaranteed – it has to be earned through empathy.

Megan FielmanMegan Fielman, CIA, PMI-RMP
Senior IT Audit & Compliance Manager

|

Humans don’t have to be the weakest link in the security chain if you empower them with trust and usable mechanisms.

Chelsea MarshallChelsea Marshall, CISSP, CEH, SEC+
Trust & Security Specialist