And we've made a huge

investment into your security

Data Security

  • All records in database are 256-bit AES encrypted.
  • Ciphers use 50 bytes unique passphrase for every tenant(Campaign).
  • Daily Encrypted backups and storage at offsite location.
  • Compliant with Data destruction requirement guidelines.

Network Security

  • Keystone is HIPAA compliant.
  • Application and database containers run in a private subnet, inaccessible from the outside internet.
  • Authentication with OAuth 2.0 and SAML standards.
  • Credentials are salted and hashed for an additional layer of security.

Platform Connectivity

  • ARMOR Threat Managers and Log reviewers to identify security and OWASP top 10 vulnerabilities with PCI ASV-level scanning.
  • End to End (E2EE) encryption. TLS 1.2+ at endpoint layer.
  • IDS (Intrusion Detection Systems) to monitor malicious activity or policy violations.
  • Routine Vulnerability scanning and Penetration tests.
  • Isolated health care clearinghouse functions with usage of Cisco ASA Firewall w/ DMZ & Private Zone.
  • Procedures to guard against malicious software host/network IPS with Sophos A/V.