
Ceros
- Websitehttps://www.ceros.com
- Trust Centerhttps://ceros.trust.page
- Compliance
We have certification from an independent auditor for compliance with ISO/IEC 27001:2013, a security management standard that specifies security management best practices and comprehensive security controls following the ISO/IEC 27002 best practice guidance.
Our information security management system (ISMS) policies and related written procedures, which adhere to this ISO/IEC 27002 standard, have been adopted to provide guidance for our implementation of good security practices and help ensure that our organizational risk is appropriately mitigated.
At Ceros, we understand the critical importance of security and availability of your data. We are proud to offer customers our SOC 2 Type 2 report, conducted by independent auditors. This examination verifies the effectiveness of our internal controls over a period of time, ensuring that we meet the highest industry standards.
By managing an effective SOC 2 Type 2 program, we assure our customers that their data is handled with the utmost care and that our systems and processes are designed to safeguard against risks. You can trust us to deliver reliable, secure, and compliant services to support your business needs.
1 more topic
- Product Security
- Data Security
- Data Encrypted At-Rest
We employ robust data encryption at rest measures, utilizing strong industry-standard algorithms like AES-256. This ensures that all your customer data remains securely protected while stored in our systems, mitigating the risk of unauthorized access and providing you with peace of mind regarding the confidentiality and integrity of your data.
- Data Encrypted In-Transit
All data transmitted to and from our platform is protected using industry-standard encryption protocols, including TLS v1.2. This ensures that your information remains confidential and secure during transit, safeguarding it from unauthorized access and ensuring a safe and reliable experience for our users.
- Privacy
Our privacy policy outlines our commitment to protecting your personal information and the steps we take to ensure its confidentiality and security. We are dedicated to being transparent about the data we collect, how it is used, and your rights regarding its control. Rest assured that we adhere to the highest standards of data protection, respecting your privacy and maintaining your trust as a valued member of our community.
- Data Retention Policy
1 more topic
- Incident Management & Response
- Incident Response Plan (IRP)
- Availability & Reliability
- Denial of Service (DoS) Protection
- Service Monitoring
null
1 more topic
- Organizational Security
- Confidentiality Agreements
Employees and contractors are required to sign NDA's upon hire.
- Employee Security Training
Employees are trained upon hire and annually therafter.
1 more topic
- Business Continuity
- Data Backups
- Environmental Safeguards
Leveraging cloud native functionality to implement redundant and resilient systems.
- Infrastructure
- Multi-Tenant Architecture
- ISO 27001 - Data Center
1 more topic
- Threat Management
- Penetration Testing
- Vulnerability Scanning
1 more topic
Sign up to see the rest of Ceros's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.