- At Photon Insights, we strictly limit access to user data, and only access user data on a need-to-know basis.
- Our employees and contractors are regularly trained on data security policies, and we maintain strict procedures to ensure that all user data is kept confidential.
- We have implemented strict procedures to ensure that user data is not compromised or stolen, and we perform regular audits and tests to ensure that our system remains secure.
- All client communications with Photon servers are protected by end-to-end encryption (HTTPS) and authenticated through a multi-factor login process.
- Data is encrypted using Advanced Encryption Standard (AES) 256, with encryption keys only accessible to authorized personnel.
- Data stored in databases, caches, and servers is directly encrypted and protected.
- All access to our systems requires multi-factor authentication (MFA) using a secure and validated identity provider.
- Access to systems and data is limited to only authorized personnel through role-based access control.
- User access to data is further controlled through a permissions model that restricts access to only the necessary data required for their role.
- We rely on Amazon Web Product (AWS), an industry standard datacenter provider, to provide reliable and hardened infrastructure that ensures the security of our platform and your data.
- We leverage AWS tools to ensure a highly resilient and fault-tolerant architecture, with built-in redundancies to eliminate any single point of failure.
- We have a comprehensive disaster recovery plan that is tested and updated regularly to ensure quick and efficient recovery in case of any unforeseen events or disasters.
- Our web application is secured using Cloudflare, which provides web application firewall (WAF) and distributed denial of service (DDoS) protection.
- We continuously monitor access to our systems and applications to detect and respond to unauthorized access attempts.
- We maintain detailed audit logs of all access attempts and system activity for analysis and forensic purposes.
- We conduct regular vulnerability assessments and penetration testing to identify and remediate potential security issues.
Photon Insights has achieved both SOC2 and ISO/IEC 27001 security certifications. SOC2 certification adheres to five trust service principles: security, availability, processing integrity, confidentiality, and privacy, ensuring a comprehensive security posture for the platform.
Photon Insights uses end-to-end encryption for data transmission, AES 256 for data encryption, and has implemented robust access control mechanisms. They also utilize Amazon Web Product (AWS) for secure data storage and Cloudflare for web application protection.
You can explore Photon Insights' security policies in detail on their dedicated security page, or get in touch at [email protected] for more details.
Access to user data is strictly limited, and only given on a need-to-know basis. Photon Insights' employees and contractors go through rigorous training for handling data securely and confidentially.
Photon Insights relies on AWS's fault-tolerant architecture to eliminate single points of failure. They also have a comprehensive disaster recovery plan, and they use Cloudflare to protect against web threats like DDoS attacks.
Photon Insights continuously monitors access to its systems and applications. Additionally, regular vulnerability assessments and penetration testing are conducted to identify and address potential security issues.