Security, Privacy and Compliance Highlights
Security, Privacy and Compliance are the top priorities at Soloinsight. CloudGate platform is considered to be pivotal to the enterprise Physical and Logical security convergence initiatives at big enterprises as it combines physical security, HR, IT and cyber security in a super secure automated platform that’s all-inclusive Physical identity and Access Management (PIAM).
Customer Data Security & Privacy Policy
You have full ownership of your data i.e. all data, including text, sound, video, or image files that are provided to us by you, on your behalf, through CloudGate platform. Soloingisht does not use your data or derive information from it for advertising or data mining purposes. You have full control over how and for how long it is stored and how it is securely accessed and when it is purged.
COMPLIANCE
CCPA
NY Shield
Privacy Shield
COPPA
EAR
FIDO Alliance
NERC-CIP
HIPAA
OSHA
CCPA
NY Shield
Privacy Shield
HIPAA
COPPA
EAR
FIDO Alliance
NERC-CIP
OSHA
CCPA
NY Shield
Privacy Shield
HIPAA
COPPA
EAR
FIDO Alliance
NERC-CIP
OSHA
MICROSOFT AZURE CLOUD
-
ISO 27001 Compliance
-
HIPAA Compliance
-
FedRAMP Compliance
-
SOC 1 and 2 Reports
-
Australia IRAP Compliance
-
UK G-Cloud Compliance
-
Singapore MTCS Compliance
-
Redundant Power
-
UPS and Backup Generators
-
Dedicated bare-metal servers
-
24/7 manned security
-
CCTV Video Surveillance
-
Multi-factor Authentication
-
Biometric Access Control
-
Security Breach Alarms
DATA RESIDENCY
Available Data Centers in other regions
US
Canada
On-Prem & Hybrid solutions are available upon request.
SECURITY BEST PRACTICES
-
Acceptable Use
-
Physical Access Control
-
Change Management
-
Information Security
-
Incident Response Plan
-
Secure Remote Access
-
Email/Communication Security
-
Data Classification
-
SaaS and Cloud Security
-
IAM Regulations
-
Privacy Regulations
-
BYOD Policy
-
Security Trainings
-
Classification Labeling
-
Background Checks
-
Disaster Recovery & Business Continuity Plan
-
National Institute of Sciences and technology - Security Best Practices
-
ITIL
-
Secure Software Development Lifecycle
-
ISO 27001/27005/27002/27701
SECURITY IMPLEMENTATIONS
-
Security Information and Event Management
-
Security Operations Center
-
Multifactor Authentications
-
Virtual Private Networks
-
Data Loss Prevention
-
End-to-End Encryptions
-
Malware Protections
-
Infra CIS Baseline Hardening
-
Cloud CIS Hardening
-
Red Teaming
-
Static and Dynamic Security Assessments
-
Secure Integrations
-
Security Automation & Orchestration
-
Secure Encryption Key Management
PHYSICAL SECURITY
Security Ops Center
24x7 Security Workforce
Days of Backup Power
Surveillance Cameras
MFA Access
Control
MFA Biometric Auth
Alarms