Security at PSignite

Your security is our top priority.

Secure platform

Our products use world-class providers as a platform that maintain a comprehensive
set of compliance certifications and attestations.

Frame 15708-2

Salesforce

            Vector  ISO 27001
            Vector  ISO 27018
            Vector  CSA STAR
            Vector  SOC 1
            Vector  SOC 2
            Vector  SOC 3
            Vector  PCI DSS
            Vector  HITRUST
 
 

Frame 15708 (1)-2

Heroku

            Vector  ISO 27001
            Vector  ISO 27017
            Vector  ISO 27018
            Vector  SOC 1
            Vector  SOC 2
            Vector  SOC 3
 
 
 
 

Frame 15708 (2)-2

AWS

            Vector  ISO 22301
            Vector  ISO 27001
            Vector  ISO 27017
            Vector  ISO 27701
            Vector  ISO 27018
            Vector  SOC 1
            Vector  SOC 2
            Vector  SOC 3
 
 

Secure solutions

Everything we do begins with security

Server security - inactive-1
Server security - active

Server security

Server security

Server security

Access to all machines is limited to the lowest number of people needed to keep them up and running. In addition, access via SSH has been disabled to prevent any unauthorized access to customer data.

Salesforce security review - inactive
Salesforce security review -  active

Salesforce security review

Salesforce security review

Salesforce security review

Our products have successfully passed Salesforce Security Review. In the review, the Salesforce Security Team tests application defenses against the attacks described on the OWASP list. They replicate security threats by attempting to extract or modify data that they don’t have permission to access. Find more more information here.

Monitoring - inactive
Monitoring - active

Monitoring

Monitoring-1

Monitoring

PSignite uses several third party services for monitoring the performance of the application. Find more in our Status Report.

Vulnerability Management - inactive
Vulnerability Management - active

Vulnerability management

Vulnerability Management-1

Vulnerability management

In addition to internal security reviews, we use tools to scan our code for vulnerabilities including Snyk. Also, we use Vanta to continuously monitor our infrastructure, perform automated security tests, and verify compliance with security standards. Find more in our Trust Report.

Testing - inactive
Testing - active

Testing

Testing-1

Testing

We use several forms of testing to ensure changes are safe to be applied. Additionally, all application and infrastructure of code change requests require at least one peer review approval from another engineer before they enter the deployment pipeline.

CI_CD - inactive
CI_CD - active

CI / CD

CI _ CD

CI / CD

We do not allow third party access to the codebase; all changes to the product are introduced by the PSignite Development Team. The CI/CD process in place guarantees smooth and automated deployments to all machines.

Server security

Server security

Access to all machines is limited to the lowest number of people needed to keep them up and running. In addition, access via SSH has been disabled to prevent any unauthorized access to customer data.

Salesforce security review

Salesforce security review

Our products have successfully passed Salesforce Security Review. In the review, the Salesforce Security Team tests application defenses against the attacks described on the OWASP list. They replicate security threats by attempting to extract or modify data that they don’t have permission to access. Find more more information here.

Monitoring-1

Monitoring

PSignite uses several third party services for monitoring the performance of the application. Find more in our Status Report.

Vulnerability Management-1

Vulnerability management

In addition to internal security reviews, we use tools to scan our code for vulnerabilities including Snyk. Also, we use Vanta to continuously monitor our infrastructure, perform automated security tests, and verify compliance with security standards. Find more in our Trust Report.

Testing-1

Testing

We use several forms of testing to ensure changes are safe to be applied. Additionally, all application and infrastructure of code change requests require at least one peer review approval from another engineer before they enter the deployment pipeline.

CI _ CD

CI / CD

We do not allow third party access to the codebase; all changes to the product are introduced by the PSignite Development Team. The CI/CD process in place guarantees smooth and automated deployments to all machines.

Data protection

We rigorously separate customer data, utilize certified data centers, and employ
secure technologies throughout our solution.

Group 20113-1

Data at rest

All data stores with customer data, in addition to S3 buckets (dedicated), are encrypted at rest. Sensitive collections and tables also use row-level encryption. This means the data is encrypted even before it hits the database so that neither physical access, nor logical access to the database, are able to read the most sensitive information.

Group 20113 (1)-1

Data in transit

We use TLS 1.2 or higher wherever data is transmitted over potentially insecure networks. Server TLS keys and certificates are managed by Salesforce / Heroku / AWS and deployed via Application Load Balancers.
 
 
 
 

Group 20113 (2)-1

Backups

All customer databases are backed up every day. Point-in-time-recovery allows the restoration of the database to any point in time within the previous seven days.

 
 
 
 

Group 20114

Data residency

Our servers are located in Salesforce, Heroku and AWS data centers, with options for data residency in the US or EU regions.

Group 20114 (1)

Data privacy

We only use customer data to offer our services. We do not share it with any third party nor use it for marketing purposes.

Secure your organization

At the organization level, you can create a complete list of approved users, set up the password approaches, and restrict logins to particular times/areas and IP addresses.

salesforce-logo

Vector-2Multi factor authentication

Vector-2Single sign-on

Vector-2Password policies

Vector-2Login history

Vector-2Allowed login IP ranges

Vector-2Allowed login hours

Vector-2Trusted IP ranges

Partner with the PSignite family today Group 20482