Transcepta never stops working to ensure your business is safe in our hands – our security and privacy is built on industry best practices and continuous compliance validation.

Product security 

All our products are secure by design. Every change and feature adheres to secure coding guidelines and is subjected to code analyzer tools, vulnerability scanners, and manual review processes. Our Software Development Life Cycle (SDLC) framework, built on industry best practices, is designed to ensure secure engineering principles are incorporated in the design process, coded into the implementation process, validated in the deployment process. 

Data security

Our security framework ensures that each customer’s data is logically separated from other customers’ data. Furthermore, we provide encryption at rest as well as in transit to protect our customers’ data. Data retention and backup happens continuously in a secure manner across encrypted networks and encrypted persistence layers. 

Disaster recovery and business continuity

Our disaster recovery and business continuity programs help us provide our customers with high data availability. Customer data is hosted in the Azure cloud with geographically diverse disaster recovery sites. This ensures that operations carry on smoothly with minimal or no loss of time, if one geographic area fails, another will come online. 

Operational security

We have a robust logging and monitoring system to ensure clean and secure traffic through our servers. We use intrusion detection and prevention systems to ensure protection and prevent misuse of our infrastructure. We use a combination of certified third-party scanning tools and in-house tools to manage vulnerabilities.

Risk Assessment Program

Transcepta has a documented risk management procedure and Secure Software Development Life Cycle process. We perform risk assessments of our products and infrastructure on a regular basis, including a review of our data classification policies and targeted reviews of highly confidential data flows.

Incident Management

A full security monitoring and incident response program is in place to alert, investigate, triage and remediate security events. Our Incident Response team performs a full investigation to determine the scope and impact of any security event or suspected incident and coordinates with the relevant teams for remediation.

Security protocols

  • Encryption at rest
  • Encryption in transit
  • Single-sign on (SSO)
  • Role-based access controls
  • Logging, auditing and monitoring features
  • Continuous, secure replication

Compliance certifications


We comply with the following industry-accepted standards to help you ensure your data is secure and compliant. 

Questions

If you have any questions about our security policy, please contact [email protected]

友情链: 万博体育app在线登录 _ 万博体育比分 - 万博体育网站app下载 | 新万博体育直播吧 _ 万博体育官网登录,万博体育 百度网盘 | 新万博体育平台~新万博体育软件,万博体育 市场总监 | 万博体育注册_ManBetX万博体育官网app入口|万博体育彩票网站 | 万博体育电脑版|万博直播-万博体育移动版 | 万博体育世界杯-万博ManBetX官方app下载 - 万博体育平台入口登录网页 | 新万博体育网站~万博ManBetX直播~万博体育下载苹果版 |