No personal data leaves your environment

Security by design

Secure infrastructure

Gain actionable, real-time intelligence for greater control and security into personal data without the data ever leaving your environment.

All personal data processing and analytics are carried out in your perimeter. Only metadata is sent to Soveren cloud, and it is stored encrypted. Communications between Soveren gateway and Soveren cloud are protected by Transport Layer Security (TLS).

Product security

Security of the product is integrated into the development lifecycle. We test every aspect of the tool from its design up, whether that be interfaces, source code, etc.

We continuously monitor the market to learn about potential threats and take reasonable actions to avoid them.

Data and communications security

Soveren uses TLS encryption and certificates with secure cipher suites and session control. The certificates are being constantly monitored to ensure that your metadata reaches the intended destination.

Our data centers provide us with AES-256 encryption at rest.

Access within our environment is provided on a need-to-know basis and is limited to authorized personnel only.

The on-premise part of the solution inherits the security features of Traefik proxy and Apache Kafka.

Dedicated experts

We have a dedicated security team that trains all of our personnel to identify security risks before they arise.

Continuous improvement

We constantly improve our technical security controls in all stages of the product development lifecycle. This approach allows us to deliver improvements in line with security best practices.

Industry standards

We are committed to following the regulations of industry-standard practices:
  • CSA Security Trust Assurance and Risk (STAR)
  • ISO/IEC 27001:2013
  • AICPA SSAE 18 with a focus on Trust Services Criteria (SOC)

See our policy

Read our information security policy for detailed information on how we handle your data.