Security is built into the fabric of Truelytics SaaS products, infrastructure, and business processes, so you can rest assured that your information is safeguarded.
Security is at the heart of everything Truelytics does from our Software Development Lifecycle to our day to day operations. Securing our customer's data is our top priority.
Absolutely. Truelytics has a comprehensive Information Security Management System in place, adhering to ISO 27001 best practices. If you'd like more insight into our approach, our policies or our processes, just ask.
Yes. Truelytics engages with independent 3rd party experts to perform security GAP analysis and network and application penetration tests on a consistent basis. In addition, we are expecting to complete our first SOC II audit in 2020.
Of course! Truelytics is committed to ensuring that you can access when you need it from where you need it. Our platform follows rigorous development best practices and our solution is hosted and managed by Microsoft Azure, ensuring exceptional uptime. All application updates and maintenance are performed outside of U.S. business hours.
We do. Truelytics infrastructure is mirrored across multiple Azure datacenters and in the extremely rare event that an issue arises at one location, we'll make sure that won't even be able to tell.
Yes! Your data is safe with us. At Truelytics, we leverage Microsoft SQL Platform-as-a-Service, managed by Microsoft Azure. This solution creates log backups every few minutes, a differential backup hourly and a full backup each week. Oh yeah, and this is all done in multiple data centers.
Yes. Our team continuously monitors and assesses our platform for any potential security episodes. If one does arise, we have robust disaster recovery and business continuity programs that include our incident response procedures that will address any concerns and ensure you are kept informed every step of the way.
Yup! Your data is encrypted in motion and at rest. All data in motion is encrypted using https, while all storage of data in Azure SQL is encrypted using Transparent Data Encryption (TDE), as are all files stored in Azure Blob Storage.
Absolutely. Truelytics is protected by a state-of-the-art Web Access Firewall (WAF) as well as Database Firewalls that are consistently updated, ensuring protection against attempts to access the application, databases and secure the platform from DDoS attacks.
Absolutely. Truelytics pushes patches and updates to servers quickly and efficiently to ensure that our infrastructure is protected. With the majority of our solutions managed as a service by Microsoft Azure, updates and patches are seamlessly deployed on a consistent basis.
Yes. Truelytics has a detailed approach to identifying, responding to and documenting any potential security incidents. If you'd like more details, just let us know.
Yes. Truelytics is hosted in the Microsoft Azure cloud and Azure adheres to security controls for ISO 27001, ISO 27018, SOC 1, SOC 2, SOC3, FedRAMP, HITRUST, MTCS, IRAP, and ENS.
You bet. Physical access to our data centers is strictly controlled with comprehensive security measures by our data center hosting partners.