- ABOUT US
While there are enhanced regulatory requirements globally for the investment managers regarding Cyber-security measures, we understand and take customer’s data security very seriously. The Sudrania infrastructure is protected by firewall and access to servers is restricted. Any PII or user authentication related data is encrypted within Database. Access to the database is only restricted to application server IP address. Along with this we are doing intrusion protection and blacklists IP address which perpetuates DDoS attack. We have anti-virus and anti-malware strategy by installing software and segregating Prod and non-prod network. We are also using AWS security groups and IAM to protect our environment further.
Along with this, we have Disaster Recovery site parallelly running in a different location from our primary data center. Disaster Recovery site is regularly tested by our IT and Business group. Various other backup and data and server redundancy strategies are in place to recover from any unforeseen situations like full lossof primary servers or partial loss of any particular server.
We also have various Proactive strategies to handle scaling of the server if CPU, memory or any other resource goes
beyond the certain point. There is constant monitoring of alerts coming out of AWS, or our firewall and process are in place to handle alerts.
Our application security infrastructure has been evaluated by an external party, and the application has also been
audited by independent auditors for SOC 2 certification.
The internet is full of blogs and articles on the benefits of cloud technology.
However, it is still not uncommon to find some discomfort with the technology
and how it’s delivered. When it comes to Financial Services, Investment
Management or Healthcare type business where data security and
confidentiality is of heightened importance, those in responsible positions at
such businesses tend to be more skeptical, and that is completely understood.
The above link can give a primer on the cloud computing and the benefits of
cloud based infrastructure. To reiterate the benefits (including those not listed
on the link above):
Seamless Solution is audited for SOC 2 Certification. We take pride in a solid and tested application development and operations system. Our SOC 2 audit covers the cyber-security testing, DR site testing, Data backups and other similarly important aspects of our tech infrastructure.