SECURITY WHITEPAPER
SECURITY WHITEPAPER
VENDOR MANAGEMENT
We leverage several third-party service providers who augment the Y Soft products ’ ability to meet your marketing , sales , services , content management , and operational needs . We maintain a vendor management program to ensure that appropriate security and privacy controls are in place . The program includes inventorying , tracking , and reviewing the security programs of the vendors who support Y Soft .
Appropriate safeguards are assessed relative to the service being provided and the type of data being exchanged . Ongoing compliance with expected protections is managed as part of our contractual relationship with them . Our Security , Legal , and Compliance teams coordinate with our business stakeholders as part of the vendor management review process .
CORPORATE PHYSICAL SECURITY
Y Soft offices are secured in multiple ways . Security guards are employed at each of Y Soft ’ s global locations to help create a safe environment for Y Soft employees . Door access is controlled using RFID tokens tied to individuals , which are automatically deprovisioned if lost or when no longer needed ( e . g ., employee termination , infrequent use , etc ). Video surveillance , and many other protective measures are implemented across Y Soft offices .
CORPORATE NETWORK PROTECTIONS
Centrally managed application firewalls are deployed for High Availability at Y Soft Corporate offices . Our guest networks are separate from our corporate network and are serviced by separate firewalls . Firewalls are set up to filter unauthorized inbound traffic from the Internet and are configured to deny inbound network connections that are not explicitly authorized by a rule .
Y Soft enforces system compliance checks prior to authorizing a device ’ s connection to the corporate network . Unauthorized devices are disconnected immediately or moved to containment VLANs .
ENDPOINT PROTECTION AND ANTIVIRUS / MALWARE PROTECTION
Y Soft leverages different endpoint protection solutions to protect its systems . These enables us to have extensive visibility into anomalous system behaviour as well as to rapidly investigate and take appropriate action through either automated event triggers or manual containment of a system .
YSoft SAFEQ Cloud - 26 - YSOFT . COM