The security of the information you put into Beejak is very important to us and we take this responsibility very seriously. We focus on keeping content secure at all steps in the application rather than simply at edge points. We use physical, technical and procedural safeguards to preserve the integrity and security of your information. Here are some of the measures we take to prevent data leaks and unauthorized data access:
Physical security
All of Beejakās servers are hosted in secure, SAS 70 audited data centers.
Defense in Depth multi-level data security
We use a series of defensive mechanisms that are layered in order to protect valuable data and information. If one mechanism fails, another steps up immediately to thwart an attack. This multi-layered approach with intentional redundancies increases the security of a system as a whole and addresses many different attack vectors.
Secure application development
Beejak follows best practices in all areas of application security and prevents common web attack vectors. When you enter information into Beejak, we use secure socket layer (SSL) technology to encrypt the transmission of your data to our servers, which helps protect your data.
Network security
All servers are firewalled to permit the minimum traffic necessary to run the service, and access to those servers is limited to Beejak employees with a legitimate business need.
Data reliability
Beejak continuously replicates your data between physical locations to prevent data loss. Additionally, Beejak stores regular backups and has the ability to perform point-in-time recovery for more granular data recovery. Beejak uses Amazon and Azure servers to manage all user data. These servers provide us with the ability to do point-in-time recovery of our entire data
Vulnerability scans
Beejak performs weekly internal vulnerability inspection at all potential points to identify security holes.
Security audits
Annual third party SOC 2 security audits by third party to ensure security of your data.