Our Promise
The security of your data is our top priority. Enterprise-grade security controls, practices and procedures are employed across our infrastructure to safeguard your information and ours.
Security
Secure software development
Pontera takes a Security and Privacy by Design approach to protecting your data. Software integrity is preserved through secure coding practices and rigorous testing that enable us to identify and remedy potential weaknesses early in the pipeline. Pontera does not currently have a bounty program, but if you discover a vulnerability, please share it with us.
Cloud and infrastructure protection
Built on industry-leading platforms, our infrastructure undergoes regular security audits and assessments to defend your data from malicious activities. Ongoing monitoring and updates to our security practices help maintain alignment with industry best practice such as CIS 1.4 benchmarks and NIST guidelines.
Risk management and continuous improvement
Risk management is core to Pontera's security strategy. Frequent assessments and improvements to our security measures allow us to anticipate and counter emerging threats. Investment in cutting-edge technologies and adoption of industry best practices provide the highest level of security for your data.
Data protection
Top-tier encryption protocols keep your data safe, during transmission and at rest. Your data remains confidential and protected even in the event of unauthorized access.
Privacy
Access control
Pontera's advanced access control framework prevents unauthorized access to your data. Our Zero Trust Network Architecture approach authenticates each request for access, limiting authorized personnel to specific resources and functionality. Fortified data confidentiality and integrity reduce the risk of breaches.
People security and training
We prioritize the security of our workforce. All employees undergo thorough background checks, mandatory security awareness and training programs to ensure a trustworthy and secure work environment. Least privilege access and regular reviews minimize unauthorized access of data and maintain a secure data environment.
Security monitoring and incident response
Continuous system monitoring allows us to respond quickly to potential threats and suspicious activity, mitigating risks and ensuring data security. Our internal capabilities and defenses are bolstered through collaboration with an external cloud security incident response provider.
Vulnerability management
Pontera takes proactive measures to identify and address system vulnerabilities. Regular assessments, scanning, and expert collaboration reduce the risk of breaches, delivering robust protection for your data.
Reliability
Availability and continuity
The availability and reliability of our services is a priority to our team. Our system is designed to withstand failures at every level. Disaster Recovery Plans (DRP) and Business Continuity Plans (BCP) are continuously tested and updated to mitigate risks and allow for quick restoration of services in the event of unforeseen circumstances.
Backup and recovery
Secure and routine backups ensure the availability of your data, and enable speedy recovery in the event of data loss or system failure.
Compliance
ISO/IEC 27001
ISO/IEC 27001 certification signifies that we have met international standards for information security management systems. It requires rigorous implementation of information security controls to ensure the confidentiality, integrity, and availability of your data.
SOC 2 Type 2
SOC 2 Type 2 certification demonstrates our compliance with stringent security and privacy practices.
California Consumer Privacy Act
Adoption of the California Consumer Privacy Act regulations adds an additional layer of privacy and protection to your personal data.
Comprehensive security measures ensure that you can focus on your business with confidence and peace of mind. Please don't hesitate to reach out to our dedicated support team with any security-related questions or concerns.
Learn more about security practices here.