No sensitive data is transmitted outside of your environment
Security by design
Secure infrastructure
Gain actionable, real-time intelligence for greater control and security into sensitive data without the data ever leaving your environment.
All sensitive data processing and analytics are carried out in your perimeter. Only metadata is sent to Soveren cloud, and it is stored encrypted. Communications between Soveren gateway and Soveren cloud are protected by Transport Layer Security (TLS).
Product security
Security of the product is integrated into the development lifecycle. We test every aspect of the tool from its design up, whether that be interfaces, source code, etc.
We continuously monitor the market to learn about potential threats and take reasonable actions to avoid them.
Data and communications security
Soveren uses TLS encryption and certificates with secure cipher suites and session control. The certificates are being constantly monitored to ensure that your metadata reaches the intended destination.
Our data centers provide us with AES-256 encryption at rest.
Access within our environment is provided on a need-to-know basis and is limited to authorized personnel only.
Dedicated experts
We have a dedicated security team that trains all of our personnel to identify security risks before they arise.
Continuous improvement
We constantly improve our technical security controls in all stages of the product development lifecycle. This approach allows us to deliver improvements in line with security best practices.
Industry standards
We are committed to following the regulations of industry-standard practices:
CSA Security Trust Assurance and Risk (STAR)
ISO/IEC 27001:2013
AICPA SSAE 18 with a focus on Trust Services Criteria (SOC)