Corporate Security
Your Privacy is Our Priority
Infrastructure Security
DDoS Protection
Softrate™ implements a high-quality DDoS protection service that efficiently fights against Layer 3, Layer 4, and Layer 7 DDoS attacks while maintaining uninterrupted authorized traffic flow.
Network Segmentation
Softrate™ has implemented a network isolation technique to safeguard sensitive information systems against security breaches and ensure their protection.
Monitoring
Softrate™ continuously monitors the availability, capacity, and security of its systems, and takes prompt action in case of any deviations.
Vulnerability Management
Softrate™ has a well-established vulnerability management technique that entails assessing the severity and impact of each vulnerability, prioritizing them according to risk, and taking necessary remediation actions to maintain the security and integrity of our systems.
Datacenter Security
In their data centers, AWS and GCP use world-class physical security includes such as strict access controls, video surveillance, intrusion detection systems, and 24/7 monitoring. These safeguards prevent unauthorized access and physical threats while also providing a secure hosting environment for our platform.
Secure Configuration Management
Our protocols ensure that operating systems and applications are configured securely, with default passwords and unneeded functions disabled. We establish and enforce security baselines often, track system configuration changes, and adhere to industry best practices such as CIS.
Disaster Recovery
We have Infrastructure as Code (IaaC) scripts that can be quickly deployed to a new environment. Our comprehensive Disaster Recovery (DR) plan maintains business continuity, and annual testing confirms its success in limiting potential interruptions and minimizing downtime.
Uptime Commitment
We commit to a 99% uptime for our platform, and any failures will result in service credit. You can track our availability and historic uptime at
Data Security
Encryption
AES 256, the industry standard for encryption, is utilized to encrypt all data at rest on our platform. Similarly, when data is in transit either within our network or over the internet, it is encrypted using HTTPS with TLS 1.2+ to ensure secure transmission.
Retention and Erasure of Data
Throughout the period of service usage, Softrate™ will uphold the maintenance of customer data. However, upon termination of the services, all data will be permanently erased from the production environment within 30 days, and from the backup system within 90 days.
Data Portability
Upon request, customers will have the option to export their data in a machine-readable format, ensuring seamless data portability after the termination of the service.
Application Security
Secure Software Development
We have a well-established change management procedure in place that ensures all code changes are authorized, tested, and verified before being sent to the production environment. This ensures that only permitted and thoroughly validated code changes are made.
Code Reviews
We adhere to secure coding practices throughout the development process and employ stringent quality gating measures, including static code analysis, to ensure the highest level of code integrity.
Automated Code Deployment
Our CICD pipeline enables secure and automated code movement without manual interventions. It ensures smooth integration, deployment, and adherence to predefined security protocols, enhancing efficiency and reliability.
Organizational Security
Third Party Security Assessment
We conduct security assessments of third-party vendors and review their contracts for security and data protection clauses. We obtain third-party audits or certifications for compliance validation and have a process to assess and manage security risks associated with third-party dependencies. Security incidents involving third-party vendors are promptly investigated and addressed.
Regulatory Compliance
Regular audits are conducted to ensure ongoing compliance, and we have a process to address and rectify any non-compliance issues. Privacy and data protection regulations, such as GDPR or HIPAA, are considered, along with specific compliance requirements of our industry or market.
Business Continuity
Softrate™ has robust Business Continuity Planning (BCP) guaranteeing uninterrupted service delivery, mitigating risks, and enabling swift recovery from potential disruptions or unforeseen events.
Security Awareness
All Softrate offices are under 24/7 CCTV survellience and employees undergo mandatory security and privacy awareness training program, supported by posters and regular awareness messages, ensuring a culture of vigilance and adherence to security and privacy practices.