Security

Security and privacy are core principles in everything that we do.

Information Security

Our team holds renowned professional certifications, including CISSP, SSCP, CISA, and OSCP. We have successfully implemented various components of information security programs for diverse clients.

Privacy

We do not access data in your dedicated instance database without your permission. If there's a need to address database-related matters, we'll request your authorization beforehand.

Assessments

We perform regular vulnerability scans and security assessments to identify and remediate any potential security issues. We conduct periodic reviews of internal controls and processes.

Encryption

All connector credentials are encrypted using AWS Key Management Service. No one is allowed to decrypt the credentials without your authorization. We also encrypt data at rest and in transit.

Dedicated Database

We implement a separate database for each Superviso instance. This architectural approach guarantees that you consistently operate within your own dedicated environment.

Automation

We heavily leverage automation to mitigate human errors. Our infrastructure is controlled through continuous integration (CI) and continuous deployment (CD).

content-image