Product Security

——— Security Overview

Security is our top priority.

We designed our security from the ground up. Every line of code and every design choice is based on providing robust security to our clients.

02 ——— Our Security Process

How do we ensure security of your data?

Cloud Security Management

Server Security Management

Network Security Management

Identity & Access Management

Employee Security Training

03 ——— Policies

Security & Privacy Policies

We have a formal, corporate-wide privacy policy in place, reviewed by counsel. We do not store or maintain personally identifiable data or credit card information. Our security program is based on ISO 27001 standards.

A formal Information Security Policy is in place with regular review and updates on: acceptable use, backup, business continuity, data classification, email use, encryption, incident response, information security, intellectual property rights, network access and authentication, outside devices, paper and electronic media, passwords, patch management – servers and applications, physical security, risk assessment, software change management, software development, and third-party vendors.

04 ——— Certifications

SOC 2 Type 2 Certified

Evisort is SOC 2 Type 2 certified and our system is equipped with automated monitoring. Your most sensitive data is in the safest and most secure environment.

SoC 2 Type 2
05 ——— Vulnerability

Vulnerability Management

Evisort undergoes regular penetration testing by disinterested third parties and continuous vulnerability monitoring to maintain the security of our solution. We’re continually scanning and testing our services internally, as well as contracting with external firms.

06 ——— Data Control

Data Control & Monitoring

Evisort has continuous monitoring in place, including network and host intrusion detection. We keep full audit logs and conduct vulnerability scans regularly.

Secure Contract Repository
07 ——— Hosting

Secure Amazon Web Services Hosting

Evisort is hosted on Amazon Web Services but can be made available for on-premise deployment for enterprise clients.

08 ——— Encryption

High Encryption Standards

Data is encrypted at rest and in transit (AES-256).

09 ——— Access Levels

Customized Access Control

Evisort allows clients to create and manage different levels of user access privileges, such as admins and read only users. Admins can also define which users have access to certain documents and folders.

10 ——— Vulnerability Testing

World-Wide Bounty Program

Evisort runs a world-wide bounty program where white-hat hackers are offered payment to discover vulnerabilities in Evisort’s system. The bounty program is one of many ways we are proactive in our security efforts.

Security Is Our Thing. Contact Us.

Menu

Schedule an Evisort Demo

Experience the next generation of contract management for yourself and see why everyone from startup companies to the Fortune 100 are leaning on Evisort for their contract management needs!