Protecting your information and the information of your customers is extremely important to us. We know you have questions about how we’re protecting that information, so what follows are details about some frequently requested information about Snowstorm Technologies information security.
We use data centers around the world from top-notch data center providers to host our systems. They all have SOC2 Type 2 reports and provide all the physical security protection measures you would expect.
We have a dedicated team to ensure we’re on the cutting edge of compliance and delivery. If we see accounts with signs of suspicious activity, we take immediate action.
We understand that software security is very important. We continuously scan our applications for vulnerabilities, using a combination of static source code analysis and dynamic testing. We also:
• Encrypt all your data in transit using TLS.
• Have an independent penetration test conducted on an annual basis.
Access to our systems and your data is restricted only to those who need access to provide you excellent support.
We also have all the “normal employee security” things you’d expect to see:
• Signed confidentiality agreements
• Termination/access removal processes
• Acceptable use agreements.
Security is the responsibility of everyone who works for us. We train our employees so that they can identify security risks and empower them to take action to prevent bad things from happening.
If you have more in-depth questions about our security program, let us know.