Security at Acterys
"Our core value of trust drives a security-first mindset that is deeply rooted in our organization."
The Foundation of Our Customers’ Success:
Fast, Effective, Smart and Secure
SOC2 Type 1 and 2
In order to ensure the continuous security, availability, confidentiality, and integrity of our customers’ data, we collaborate with an independent auditor to maintain a SOC 2 report. This report objectively verifies the controls in place to meet the Trust Services Criteria established by the Assurance Services Executive Committee (ASEC) of the AICPA. These criteria assess the design and operating effectiveness of controls related to the security, availability, processing integrity, confidentiality, and privacy of information and systems at an entity or division.
Join the thousands of companies that trust Acterys
Our Top Priority:
Ensuring Customer Safety and Security
By implementing a security-focused approach, we can consistently demonstrate our commitment to security and compliance, create a culture of compliance, and always feel confident in our security posture.
Continuous Compliance
Ongoing process of ensuring that our business adheres to all relevant laws, regulations, and standards. This can include maintaining accurate and up-to-date records, implementing policies and procedures to prevent violations, and regularly reviewing and updating compliance efforts to ensure they are effective. Continuous compliance helps to protect an organization from legal and financial risks and can also improve its reputation and trustworthiness.
Multi-Factor Authentication (MFA)
MFA is a security process that requires users to provide multiple forms of identification in order to access our application. This can include using a password, a biometric identifier such as a fingerprint or facial recognition, and a code sent to a separate device, such as a phone or email. The purpose of multi-factor authentication is to increase the security of a system by making it more difficult for unauthorized users to gain access. Read Microsoft's Take on the Importance of MFA
Automated Detection and Response Technology
This is designed to automatically detect and respond to potential threats or anomalies within our network. Our technology uses algorithms and artificial intelligence to continuously monitor and analyze data and can quickly identify and respond to potential threats in real time.
40% of Acterys’s clients cited the company’s commitment to security as a key factor in their decision to choose Acterys.
An End-to-End Compliant Solution
- SOC 1 Type 2 and SOC 2 Type 2 reporting to meet your internal information security requirements.
- To ensure our clients can operate without interruptions, we maintain and regularly test an enforced business continuity plan (BCP) and disaster recovery plan (DR) because xP&A is a daily necessity.
- Geo-replication
- Microsoft Azure provides several security measures to protect data and infrastructure in the cloud. Some of these measures include:
- Network security: Azure uses firewalls and virtual private networks (VPNs) to secure data transmission between cloud resources and on-premises networks.
- Access control: Azure provides access control through role-based access control (RBAC), which allows administrators to grant specific permissions to users based on their job roles and responsibilities.
- Identity and authentication: Azure uses multi-factor authentication (MFA) to provide an additional layer of security when accessing cloud resources.
- Data protection: Azure provides data encryption at rest and in transit to protect data from unauthorized access. It also provides data backup and disaster recovery services to ensure data availability and recovery in case of a data loss event.
- Compliance: Azure is compliant with a number of industry standards, including HIPAA, PCI DSS, and ISO 27001, to ensure data privacy and security in regulated industries.
- Overall, Azure provides a secure and reliable cloud platform for businesses to store and process data.
- It is an important security measure that helps organizations ensure that their systems and networks are secure and can withstand real-world attacks.
- The importance of multi-factor authentication lies in its ability to add an extra layer of security to the authentication process. By requiring multiple forms of authentication, it becomes much more difficult for attackers to gain access to a system or account. This can help prevent unauthorized access and protect sensitive data and resources.
Why Acterys
Fast
Implement smart solutions for your most pressing business challenges in weeks – not months.
Flexible
Build business applications to solve your unique operational problems - no coding required.
Easy To Use
Get started in minutes with 1-click integrations that pair with the tools you already use every day.
Secure
Protect your sensitive financial and business data in a controlled environment of your choosing.
Acterys In Action
Frequently Asked Questions
SOC 2 is a type of audit that assesses the controls related to a company’s information technology and data security. It is designed to provide assurance to customers that the company has implemented adequate controls to protect the security, availability, processing integrity, confidentiality, and privacy of its customers’ data.
For customers, the main benefit of a company undergoing a SOC 2 audit is that it can provide peace of mind that their data is being handled in a secure and responsible manner. This is particularly important for companies that handle sensitive data, such as financial information or personal identifiable information. A SOC 2 audit can also help customers comply with their own regulatory or compliance requirements, if they are required to work with companies that have strong controls in place for protecting data.
During a SOC 2 audit, the auditing firm will review the company’s policies, procedures, and practices to ensure that they align with the Trust Services Criteria. This may include reviewing the company’s information technology infrastructure, its access controls, its incident response processes, and its data backup and recovery procedures.
The auditing firm will also test the company’s controls to ensure that they are operating effectively. This may involve reviewing logs, conducting interviews with staff, and performing other types of testing to verify that the controls are functioning as intended.
At the end of the audit, the auditing firm will issue a report that details its findings and conclusions. If the company’s controls are found to be in compliance with the Trust Services Criteria, it will be awarded a SOC 2 certification.
Get Started
Modernize your planning and analytics. Talk to our experts today to get started with a free trial.