Information Security
SAAS FORENSIC SCHEDULE ANALYTICS PTE. LTD and our affiliates worldwide (collectively, “FSA,” “we,” “us,” “our”) is developed and built with the enterprise in mind. We implement risk-based and standards-based security protocols to secure both our services and customer data. Our security program ensures compliance with industry standards and best-practices for information security, corporate controls, and software development.
Network and Endpoint Security
We have systems in place to ensure your data is safe from malware, vulnerabilities, and other cybersecurity threats like network-based attacks and unauthorised access. We perform penetration testing using a trusted third party. We utilise the following applications:
- SSL/TLS which encrypts communications between a client and server, primarily web browsers and web sites/applications. SSL (Secure Sockets Layer) encryption, and its more modern and secure replacement, TLS (Transport Layer Security) encryption, protect data sent over the internet or a computer network.
- SSL for SaaS makes encryption easy so clients will have more confidence than ever in your service, knowing their data is safe.
- A Web Application Firewall (WAF) which protects your web apps by filtering, monitoring, and blocking any malicious HTTP/S traffic travelling to the web application, and prevents any unauthorised data from leaving the app. It does this by adhering to a set of policies that help determine what traffic is malicious and what traffic is safe.
- A DNS (Domain Name System) service that offers the fastest response time, unparalleled redundancy, and advanced security with built-in DDoS (distributed denial-of-service) mitigation and DNSSEC.
- DNSSEC (Domain Name System Security Extensions) which strengthens authentication in DNS using digital signatures based on public key cryptography.
Governance
FSA works to ensure that security is a key consideration of all company initiatives. All our employees receive security and privacy training and testing. We have comprehensive policies and procedures in place designed to manage the integrity of our environment, and ensure security is embedded at a technical, physical and operational level.