——— Security Overview
Security is our top priority.
We designed our security from the ground up. Every line of code and every design choice is based on providing robust security to our clients.
02 ——— Our Security Process
How do we ensure security of your data?
03 ——— Policies
Security & Privacy Policies
A formal Information Security Policy is in place with regular review and updates on: acceptable use, backup, business continuity, data classification, email use, encryption, incident response, information security, intellectual property rights, network access and authentication, outside devices, paper and electronic media, passwords, patch management – servers and applications, physical security, risk assessment, software change management, software development, and third-party vendors.
04 ——— Certifications
SOC 2 Certified
Evisort is SOC 2 certified and our system is equipped with automated monitoring.
05 ——— Vulnerability
Evisort undergoes regular penetration testing by disinterested third parties and continuous vulnerability monitoring to maintain the security of our solution. We’re continually scanning and testing our services internally, as well as contracting with external firms.
06 ——— Data Control
Data Control & Monitoring
Evisort has continuous monitoring in place, including network and host intrusion detection. We keep full audit logs and conduct vulnerability scans regularly.
07 ——— Hosting
Secure Amazon Web Services Hosting
Evisort is hosted on Amazon Web Services but can be made available for on-premise deployment for enterprise clients.
08 ——— Encryption
High Encryption Standards
Data is encrypted at rest and in transit (AES-256).
09 ——— Access Levels
Customized Access Control
Evisort allows clients to create and manage different levels of user access privileges, such as admins and read only users. Admins can also define which users have access to certain documents and folders.
10 ——— Vulnerability Testing
World-Wide Bounty Program
Evisort runs a world-wide bounty program where white-hat hackers are offered payment to discover vulnerabilities in Evisort’s system. The bounty program is one of many ways we are proactive in our security efforts.