At Augmentt, our commitment to security is weaved through the fabric of our entire organization. We value your data, privacy, and trust, and work hard to protect it.
Trust
Whether it is in ensuring the security of customer data, providing scalable infrastructure for business partners, or protecting employee’s personal information; trust is always at the core. At Augmentt, we pride ourselves on having a transparent model that demonstrates our full commitment to information security.
By adopting a compliance framework based on industry-recognized standards and cyber security management models we’ve made continual improvements on security measures across our organization. As part of our commitment to protect customer data, we’ve achieved SOC2 and GDPR compliance.
Want to request a SOC2 report or signal a security concern? Email us at security@augmentt.com
Security
Cybersecurity is at the foundation of Augmentt’s core culture and service offering. We recognize the importance of healthy cybersecurity and privacy management and are committed to adhering to best-in-class security practices.
Combined with a comprehensive risk-based management approach and security awareness as the foundation of its practices, at Augmentt we’ve defined and continuously monitor the following objectives:
Identify and comply with the applicable laws, regulations, and contractual requirements.
Protect the company’s information assets, as well as all information entrusted to the company within its business activities.
Ensure the availability and reliability of the infrastructure and services as per defined Service Legal Agreements (SLAs) and contractual requirements.
Infrastructure
Augmentt utilizes Amazon Web Services (AWS) as its primary cloud computing service provider due to its best-in-class security management practices and data center physical security. AWS guarantees scalability, availability, and quality of provided infrastructure which is the foundation of Augmentt’s commitment to delivering best-in-class MSP services.
Our infrastructure is secured based on industry-recognized practices and is accessible only to a strict minimum, hand-picked IT professionals who perform administrative tasks and other maintenance activities.
Architecture
Augmentt service architecture consists of defense-in-depth and zero trust principles designed to support confidential information exchange and processing. All data in transit and at rest is secured using encryption mechanisms. All configurations are continuously benchmarked against industry security standards and practices to guarantee production system integrity.
Regular vulnerability scanning and pen testing exercises performed by various independent third parties allow Augmentt to ensure a high level of assurance of designed architecture and provided services.
Data Security
Augmentt operates in a multi-tenant environment utilizing logical isolation to separate tenant data.
Account authentication, logical database field separation, session management controls, and distinct encryption keys are implemented to restrict customer access to the data associated with their respective organization.
System configuration and database snapshots are taken daily. All backups have the same protection in place as in production.
All client data shall be retained strictly during the contract period and securely disposed of upon client request or contract termination.
Want to make a data inquiry or a request? Email us at security@augmentt.com
Access Management
Access management is an important aspect of any cyber security management model. Augmentt puts a lot of effort behind enforcing access strictly on a need-to-know basis. Management reviews each user’s access to systems and data on a quarterly basis to r remove all access that is no longer required. All-access is then removed upon termination of employment.
Operations
Augmentt monitors all services for performance and any malicious activity. We collect logs produced by networking devices such as firewalls, security services such as IDS/IPS, as well all services and devices present in the production environment. All events, as well as activity patterns, are reviewed for suspicious activity or performance degradation.
Vendor management
Augmentt thoroughly reviews all third-party service providers and retains only those that comply with our own security policies and practices. We prioritize service providers that share the same corporate cybersecurity culture. Augmentt performs all vendor reassessments at least annually.
Compliance
We work with third-party auditing firms to test our security controls, policy, plans, and other documentation for compliance against best industry standards and cyber security management practices. Penetration testing is performed annually.
Privacy
Augment recognizes the importance of privacy requirements for its customers and employees. We have been assessed against different privacy standards and regulations, including but not limited to PIPEDA and GDPR.
Want to make a data inquiry or report an incident? Email us at security@augmentt.com
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.