Skip to main content

A Commitment to Security

We understand that ESOP data is highly sensitive. We are committed to protecting your data and your clients’ data with enterprise-grade security and compliance features.

Core Security Features

  • Data Encryption: All data is encrypted at rest using AES-256 and in transit using TLS 1.2+.
  • Data Isolation: In our multi-tenant cloud environment, each client’s data is logically isolated. For complete isolation, we offer a single-tenant private cloud deployment.
  • Regular Security Audits: We conduct regular internal and third-party security audits and penetration tests to identify and address potential vulnerabilities.
  • Secure Software Development: We follow a secure software development lifecycle (SSDLC) to ensure that security is built into our platform from the ground up.

Compliance

  • SOC 2: Our managed cloud platform is SOC 2 Type II compliant. We can provide our SOC 2 report upon request under an NDA.
  • GDPR & CCPA: We are committed to complying with data privacy regulations like GDPR and CCPA.

Enterprise Security Features

  • Single Sign-On (SSO): Integrate with your existing identity provider (e.g., Okta, Azure AD, SAML) for secure and convenient authentication.
  • Role-Based Access Control (RBAC): We can work with you to define custom roles and permissions for your team members, ensuring that users only have access to the data and features they need.
  • Audit Logs: A detailed audit trail of all actions taken within the platform, including user logins, simulation runs, and configuration changes.
  • IP Whitelisting: Restrict access to the platform to a list of approved IP addresses.
  • Data Residency: For clients with specific data residency requirements, we can deploy the platform in a specific geographic region in our Private Cloud offering, or you can use our On-Premise offering.

Your Responsibilities

Security is a shared responsibility. While we provide a secure platform, you are responsible for:
  • Securely Managing API Keys: Treat your API keys like passwords and keep them secure.
  • Managing User Access: Ensure that only authorized users have access to the platform and that their permissions are appropriate for their role.
  • Securely Configuring Your Systems: If you are using our On-Premise or Private Cloud offerings, you are responsible for securely configuring your underlying infrastructure.
Contact our security team for more detailed information about our security and compliance program.