Evolvemotive takes security seriously
Here are our practices.
We employ rigorous security measures at organizational, architectural, and operational levels to protect our applications, our infrastructure, and the data of our customers and website visitors. At Evolvemotive, we actively promote security awareness, provide training on data protection, and implement best practices, so that security principles and data privacy are top of mind for our employees. Evolvemotive considers information security principles when designing our platform, managing our networks, and conducting our daily business operations.
Evolvemotive has implemented formal data privacy, information security, and acceptable use policies that govern employee activities. We train our employees on these policies during onboarding and regularly thereafter. In addition, we rely on our Information Security and IT teams to enforce policies through the implementation of technical controls.
Evolvemotive performs regular information security risk assessments covering our facilities, systems, and information assets. We share risk assessment results and risk mitigation suggestions with senior management, as appropriate. Our risk assessment results specify proposed changes to systems, processes, policies, and tools to reduce security vulnerabilities and threats to Evolvemotive, its customers, and its website visitors. We mitigate risks through the implementation of policies, procedures, and controls.
Vendor Security Management
Evolvemotive conducts and records vendor security assessments for its service providers. Vendors are approved or rejected based on their relative security posture and the risk they would introduce for Evolvemotive.
Evolvemotive employs state-of-the-art endpoint security protections, intrusion detection systems, and advanced email protections to monitor our systems and prevent potential security incidents. Evolvemotive uses a next-generation anti-malware solution to address malicious software and other threats. Anti-malware agents are centrally managed and are configured to install updates regularly. These agents alert operations analysts when malware is detected so they can take action.
Evolvemotive uses a vulnerability management program to identify and remediate vulnerabilities across our networks, reducing exposure, and minimize our attack surface. We also conduct 24/7 monitoring of our critical systems.
Evolvemotive uses identity and access management controls to provide access to our systems through user accounts with appropriate privileges. Evolvemotive provisions all critical network and application access using the principle of least privilege. We limit key administrative access to authorized personnel. Provisioning and de-provisioning procedures exist to document the relevant access levels and approvals granted to critical systems and data. We conduct periodic access reviews for critical systems and applications, using a risk-based approach.
Evolvemotive uses an identity management single sign-on platform provider for our critical business applications. We assign users unique IDs and enforce password requirements that align, at a minimum, to NIST standards. Our identity management platform enforces Evolvemotive’s password policy and requires multifactor authentication.
The Evolvemotive platform is hosted in the cloud and in state-of-the-art data centers. The co-located data centers provide physical and environmental security controls (including biometric identification, supervised entry, 24/7/365 on-premise security teams, and CCTV systems). Access to data centers is restricted to authorized individuals. Our data center facilities maintain SOC 2 reports, which describe and test the internal controls of the service organization.
Data Privacy and Protection
Evolvemotive takes the protection of personal data seriously. Databases are gated by role-based access controls, and multi-factor authentication is enforced on login. Evolvemotive employs recognized encryption protocols for data in transit and at rest.
Evolvemotive delivers security awareness and data privacy training to employees during the onboarding process and regularly thereafter. Additionally, our Information Security team frequently publicizes alerts and security tips through internal communications channels.
Evolvemotive maintains documented backup procedures. Evolvemotive regularly performs full backups of all production databases. Data backups are replicated to an offsite location on a regular schedule.
Evolvemotive employs both internal and external testing of our platform. We’ve also partnered with a third-party platform to host our bug bounty program, enabling security researchers to securely report vulnerabilities and bugs in Evolvemotive platforms and systems. In addition, we’ve engaged a security expert to conduct external network and web application penetration testing periodically. Evolvemotive applies a systematic approach to managing change so that changes to services impacting Evolvemotive and our customers are first reviewed, tested, and approved. The goal of Evolvemotive’s change management process is to prevent unintended changes from reaching our production environment. All critical changes deployed to production undergo a review, testing, and approval process before release.