![]() When an alert is detected that presents a risk to our business, our incident response plan is initiated to identify, respond, analyze, contain, remediate, and recover. We use tools that provide us with visibility into our environment for incident response, reporting, and troubleshooting capabilities. Our team monitors for malicious activity such as attempted & active intrusions, excessive login attempts, malicious code injections & executions and is on call 24/7 to respond to security alerts and events. ![]() The keys are symmetric and are a combination of 256-bit Elliptic Curve Diffie-Hellman and AES Galois Counter Mode (GCM) keys derived from a hardware secure module (HSM) backing key in counter mode using Hashed Message Authentication Code (HMAC) with Secure Hash Algorithm (SHA) 256. EncryptionĪll customer data including log and backup data are encrypted using TLS over HTTPS for data in transit and AES 256 bit encryption for data at rest. To request a copy of data center compliance reports, please contact us at. These facilities are regularly tested for security controls and compliance by independent third parties and data center compliance reports can be provided upon request. Terminus servers, infrastructure, and applications are hosted in world-class SOC, ISO, FedRAMP, CSA, GDPR, HIPAA, and PCI DSS compliant facilities. ![]() We ensure the confidentiality and integrity of your data with industry standards and best practices. To request a copy of our SOC 2 report, please contact us at. This is an important step to ensure our customers understand that information security is important to us and we value our customers. ![]() Terminus has completed the examination for Service Organization Controls (SOC) 2 as well as the international information security standard (ISO27001). We implement security best practices to meet industry compliance. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |