Security and Availability

Systems and Controls Ensuring Exceptional Data Security and Privacy

man looking at phone man looking at phone

Data protection and continuous operations are essential for the hundreds of security and compliance-minded companies using Sentieo today.

Incorporating established best practices and industry certifications, the Sentieo platform and operations were developed as a world-class data security and availability program that protects internal processes while providing you with peace of mind.

Read the Datasheet

Encrypted

Encrypted Data Transfer and Storage

Your data is protected in transit and at rest using a variety of industry-standard access controls and best practices:

  • Communication to our servers via HTTPS secure web protocol and following user-authenticated login
  • Authentication of user requests via one-way encryption against a secure database and named servers with specific access keys
  • Automatic encryption of all customer content using Advanced Encryption Standard (AES) 256
  • Encryption of database, search engine, and system drives that store user data

AWS

Secure Cloud Computing With AWS

All of the development, testing, and production environments, as well as supporting infrastructure, live within the Amazon Web Services (AWS) cloud computing environment, featuring:

  • Climate-controlled independent cooling systems, uninterruptible power supply (UPS), and fire suppression
  • Video surveillance and dual-authentication barriers, including biometric scanners, of physical access to sensitive areas
  • 24/7 staffing by background check-cleared and trained security technicians
  • Server access that is protected by multi-factor authentication protocols, and identity access management using secure communication sessions over SSL/TLS

High Availability

Our commitment to continuous operations and high availability of the Sentieo platform extend well beyond the standards set by AWS for all of their customers. Additional controls we’ve put in place include:

  • Replication of our production data to redundant systems
  • Risk mitigation planning, including regular disaster recovery drills and penetration testing

Comprehensive Internal Controls and Processes

Sentieo’s information security program and infrastructure design align with industry standards regarding security and risk management best practices, including:

  • Limited access to a user’s personal information
  • Security incident management
  • Change and configuration management
  • Adherence to the principle of least privilege for access control

Global Security

Compliance With Global Security Standards

Sentieo is certified SOC 2, Type 1 compliant and adheres to global security standards for monitoring, testing, and auditing, ensuring our ability to protect customer security through:

  • Daily backups to support data restoration if needed
  • Emergency protocol procedures to respond to unplanned events
  • Ongoing information technology risk planning
  • Comprehensive staff training on information security
  • Regular penetration and vulnerability testing by third-party experts
  • Constant monitoring for access anomaly detection and web service uptime for potential denial of service attacks

Want to learn how Sentieo can improve your team’s research experience in a data-secure environment? Request a demo.