TECHNOLOGY

CYBER SECURITY

While there are enhanced regulatory requirements globally for the investment managers regarding Cyber-security measures, we understand and take customer’s data security very seriously. The Sudrania infrastructure is protected by firewall and access to servers is restricted. Any PII or user authentication related data is encrypted within Database. Access to the database is only restricted to application server IP address. Along with this we are doing intrusion protection and blacklists IP address which perpetuates DDoS attack. We have anti-virus and anti-malware strategy by installing software and segregating Prod and non-prod network. We are also using AWS security groups and IAM to protect our environment further.

technology-img

Along with this, we have Disaster Recovery site parallelly running in a different location from our primary data center. Disaster Recovery site is regularly tested by our IT and Business group. Various other backup and data and server redundancy strategies are in place to recover from any unforeseen situations like full lossof primary servers or partial loss of any particular server.

We also have various Proactive strategies to handle scaling of the server if CPU, memory or any other resource goes
beyond the certain point. There is constant monitoring of alerts coming out of AWS, or our firewall and process are in place to handle alerts.

Our application security infrastructure has been evaluated by an external party, and the application has also been
audited by independent auditors for SOC 2 certification.

technology-logo
CLOUD TECHNOLOGY

Fully Hosted And Operated Via Cloud

The internet is full of blogs and articles on the benefits of cloud technology.
However, it is still not uncommon to find some discomfort with the technology
and how it’s delivered. When it comes to Financial Services, Investment
Management or Healthcare type business where data security and
confidentiality is of heightened importance, those in responsible positions at
such businesses tend to be more skeptical, and that is completely understood.

https://aws.amazon.com/what-is-cloud-computing/

The above link can give a primer on the cloud computing and the benefits of
cloud based infrastructure. To reiterate the benefits (including those not listed
on the link above):

  • No upfront capital expenses
  • Optimum capacity utilization
  • Global access and availability of applications/data
  • Overall reduced cost of technology (ownership, use, and
    maintenance)
  • It unchains you from your office desk!
  • Scalability of infrastructure
  • Elimination of maintenance of physical data center
  • Excellent Disaster Recovery Mechanism
  • Better Security and Availability of Cloud infrastructure
    than on-premise
SOC 1 & SOC 2 Certified

Fully Hosted And Operated Via Cloud

Seamless Solution is audited for SOC 2 Certification. We take pride in a solid and tested application development and operations system. Our SOC 2 audit covers the cyber-security testing, DR site testing, Data backups and other similarly important aspects of our tech infrastructure.

Our Fund Services operations are SOC 1 Certified.
aicpa-logo
Connect with Us

Cyber Security Terms of Use
Privacy Policy User Agreement ©2019 by Sudrania Fund Services.