Data Migration Route 1920x1080

Our Approach to Security

A program of best practices and our own principles designed to ensure our work is secure.

The Program

Over its 25+ years of activities, Equisoft has developed and deployed an extensive security program that follows the industry's best practices. The objective of this program is to ensure that a comprehensive framework is deployed at different levels in the organization to ensure the security, confidentiality, integrity and availability of information, intellectual property, and systems for Equisoft as well as its clients.

Ensuring Compliance

Equisoft is SSAE 18 SOC 2 certified. Such certification ensures that the security framework in place meets and exceeds the industry standards. An independent third-party body periodically audits Equisoft's controls, policies and processes to ensure compliance.

The SOC 2 report can be provided on demand. Please contact your account manager or Equisoft's sales representative.

Secure Software Development

Equisoft maintains policies, processes and procedures to ensure that secure development practices are embedded into the Software Development Life Cycle (SDLC).

Whether it's penetration tests conducted by an independent third-party body, systematic peer reviews performed on the code base or developers attending security awareness trainings, Equisoft adopts a continuous improvement approach to constantly improve its development practices from a security standpoint.

Operational Framework

Equisoft's security team works hand in hand with the various operational teams in order to make sure that their operational frameworks include state of the art security practices.

Each solution hosted by Equisoft is properly monitored 24/7 by a dedicated production support team that uses well-defined processes to identify, investigate and remediate security events. Any incident, actual or potential, is managed by the same rigorous processes that are constantly improved and enhanced.

Disaster Recovery and Business Continuity

Equisoft maintains Disaster Recovery and Business Continuity plans that ensure the organization's resiliency. Such plans ensure that no matter the disrupting factors it could face, Equisoft operations would carry on and it would continue to support its clients with little if no downside.

Risk Assessment

Equisoft performs continuous risk assessment at different levels in the organization. Such assessment leads to the continuous improvement of its policies, processes and practices.

Google API Compliance

Equisoft/connect uses Google APIs to enable email sending and management within the application. Equisoft/connect's use and transfer to any other app of information received from Google Accounts will adhere to Google API Services User Data Policy, including the Limited Use requirements.

Security Incident Reporting

Equisoft takes security seriously. We invite you to help ensure the continued security of data, products, and resources by letting us know if you identify any potential issues.

We manage all security incidents with great importance and investigate them in a timely manner.

To report a problem or vulnerability please email us at: isg@equisoft.com.

Questions or Comments