Security, privacy & compliance

It’s time to take security out of the footer.

At Augmentt, our commitment to security is weaved through the fabric of our entire organization. We value your data, privacy, and trust, and work hard to protect it.
image-1-trust

Trust

Whether it is in ensuring the security of customer data, providing scalable infrastructure for business partners, or protecting employee’s personal information; trust is always at the core. At Augmentt, we pride ourselves on having a transparent model that demonstrates our full commitment to information security. 

By adopting a compliance framework based on industry-recognized standards and cyber security management models we’ve made continual improvements on security measures across our organization. As part of our commitment to protect customer data, we’ve achieved SOC2 and GDPR compliance.  

Want to request a SOC2 report or signal a security concern? Email us at security@augmentt.com.

image-1-trust
image-2-security
image-2-security

Security

Cybersecurity is at the foundation of Augmentt’s core culture and service offering. We recognize the importance of healthy cybersecurity and privacy management and are committed to adhering to best-in-class security practices. 

Combined with a comprehensive risk-based management approach and security awareness as the foundation of its practices, at Augmentt we’ve defined and continuously monitor the following objectives: 

  • Identify and comply with the applicable laws, regulations, and contractual requirements. 
  • Protect the company’s information assets, as well as all information entrusted to the company within its business activities. 
  • Ensure the availability and reliability of the infrastructure and services as per defined Service Legal Agreements (SLAs) and contractual requirements. 

Infrastructure

Augmentt utilizes Amazon Web Services (AWS) as its primary cloud computing service provider due to its best-in-class security management practices and data center physical security. AWS guarantees scalability, availability, and quality of provided infrastructure which is the foundation of Augmentt’s commitment to delivering best-in-class MSP services. 

Our infrastructure is secured based on industry-recognized practices and is accessible only to a strict minimum, hand-picked IT professionals who perform administrative tasks and other maintenance activities.  

Architecture

Augmentt service architecture consists of defense-in-depth and zero trust principles designed to support confidential information exchange and processing. All data in transit and at rest is secured using encryption mechanisms. All configurations are continuously benchmarked against industry security standards and practices to guarantee production system integrity.

Regular vulnerability scanning and pen testing exercises performed by various independent third parties allow Augmentt to ensure a high level of assurance of designed architecture and provided services.

Data Security

Augmentt operates in a multi-tenant environment utilizing logical isolation to separate tenant data.  

Account authentication, logical database field separation, session management controls, and distinct encryption keys are implemented to restrict customer access to the data associated with their respective organization. 

System configuration and database snapshots are taken daily. All backups have the same protection in place as in production. 

All client data shall be retained strictly during the contract period and securely disposed of upon client request or contract termination.  

Want to make a data inquiry or a request? Email us at security@augmentt.com.

Access Management

Access management is an important aspect of any cyber security management model. Augmentt puts a lot of effort behind enforcing access strictly on a need-to-know basis. Management reviews each user’s access to systems and data on a quarterly basis to r remove all access that is no longer required. All-access is then removed upon termination of employment.   

Operations

Augmentt monitors all services for performance and any malicious activity. We collect logs produced by networking devices such as firewalls, security services such as IDS/IPS, as well all services and devices present in the production environment. All events, as well as activity patterns, are reviewed for suspicious activity or performance degradation.

Vendor management

Augmentt thoroughly reviews all third-party service providers and retains only those that comply with our own security policies and practices. We prioritize service providers that share the same corporate cybersecurity culture. Augmentt performs all vendor reassessments at least annually.

Compliance

We work with third-party auditing firms to test our security controls, policy, plans, and other documentation for compliance against best industry standards and cyber security management practices. Penetration testing is performed annually.

Privacy

Augment recognizes the importance of privacy requirements for its customers and employees. We have been assessed against different privacy standards and regulations, including but not limited to PIPEDA and GDPR. 

Want to make a data inquiry or report an incident? Email us at security@augmentt.com.

Important Links

SLL Security Report

Service Level Agreement

SLA 

Cookies

Unsubscribe me

Subscribe

Want to stay informed on Augmentt’s progress? Please sign up for our regular updates. We won’t spam you, we promise!

[contact-form-7 id=”2641″ title=”Newsletter footer form”]
Contact:

Telephone: 888-670-8444
Fax: 647-372-0393

450 March Rd – Unit 102
Kanata, Ontario, Canada
K2K 3K2

Contact:

888-670-8444
450 March Rd.
Unit 102
Kanata, Ontario
K2K 3K2
(fax) 647-372-0393

Subscribe

If you wish to receive our latest news in your email box, just subscribe to our newsletter. We won’t spam you, we promise!

[contact-form-7 id=”2639″ title=”Newsletter footer form”]

Copyright 2021. Augmentt Technology Inc.  All rights reserved.

Bitnami