Security and privacy are cornerstones of our business
Our highest priority is keeping the data of our customers secure. We deploy the best-in-class organizational, architectural, and operational measures to make sure of that.
Security and privacy are cornerstones of our business
Our highest priority is keeping the data of our customers secure. We deploy the best-in-class organizational, architectural, and operational measures to make sure of that.
Identity management
We ensure that only right people and approved devices can access your company’s information in Cequence with features like single sign-on, domain claiming and multi-factor authentication.
Data protection
By default, Cequence encrypts data at rest and data in transit for all of our customers. Our data protection procedures make certain it would take several lifetimes to decrypt an account.
Information compliance
Cequence offers governance and risk-management capabilities that will meet your organization’s needs, no matter what they are. This includes global retention policies & support for eDiscovery.
Privacy
Cequence privacy program was founded on strict policies and procedures regarding access, use, disclosure, transfer and other processing of customer data. The core of our privacy program is that Cequence employees never access or process customer data unless it is in accordance with a contractual agreement or at the direction of the customer.
Vulnerability Assessments
Cequence contracts with third-party cyber-security experts to conduct independent analysis comprising of internal and external network, system, and application vulnerability scans and assessments. We implement top class security safeguards to ensure system stability and penetration protection.
Application
We perform third-party application-level security vulnerability assessment of our system on a regular basis. The experts exercise testing procedures to identify standard and advanced web application security vulnerabilities.
Network
External vulnerability assessments scan all internet-facing assets for potential weaknesses that could allow unauthorized access to the network. In addition, a comprehensive internal vulnerability network and system assessment is performed.