Keeping your data secure

Gotransverse helps companies ensure their data security processes are up to date with a suite of robust security features and policies—we are dedicated to ensuring our customer’s data is safe at all times.

Platform security graphic
Features

Compliance and Security at Gotransverse

Gotransverse security

Gotransverse keeps data security top of mind. Our customers get industry-leading protection at scale. All personal information is kept private at all times, and is back by rigorous auditing and compliance certifications.

  • Automated log checks
  • IDS & SIEM in all data centers
  • PCI DSS, SOC II Type II and SOC 2 Type II
  • Disaster Recovery/Business Continuity

We prioritize data security not only for you, but for your customers as well.

How we do it

Next-level security and compliance

  • Auditing & Encryption
  • Network Security
  • PCI Certification
  • Annual SOC Type II and SOC 2 Type II
  • Disaster Avoidance
  • Disaster Recovery
  • Auditing & Encryption

    • Audit logs of data input or changed via UI and API for all updates
    • Automated log checks
    • All data in transit is encrypted, sensitive data is encrypted while at rest
    • All off-site backups are encrypted
  • Network Security

    • Solid segregation of production zone from other network zones within the organization
    • Strong password policies across all systems
    • Intrusion Detection System & Security Information Environment Management implemented in all data centers (prod and non-prod)
    • All changes track back to ticket
    • Separation between application developers and platform operations
  • PCI Certification

    • PCI Zone Hardened / Data Encrypted
    • Monthly Vulnerability Scans
    • External and Internal Penetration Tests by 3rd Party
    • Annual Company Wide Security Training
    • Annual OWASP Developer Training
    • Annual Audit
  • Annual SOC Type II and SOC 2 Type II

    • Security Review of each Release
    • Evidence of Policy Adherence
    • Annual Audit
  • Disaster Avoidance

    • N+1 or 2N at all layers of application
    • Elastic scaling to prevent overload in high volume
    • systems
    • Task morphing: app servers dedicated to tasks but quickly switchable to other functions
    • Deployed across multiple availability zones in a region
    • Servers targeted to 65% capacity under normal load
  • Disaster Recovery

    • Recovery Point Objective of less than 5 minutes
    • Recovery Time objective of less than 24 hours
    • Annual testing of DR site failover