fact sheet

Is your extended workforce data secure?

Information is the basis of your business and your most valuable asset. You need to ensure that your confidential information is protected. This applies not only to your company’s data but also to personally identifiable information (PII) pertaining to employees, contingent workers, and contractors engaged by your company.

Use this checklist to ensure that your contingent workforce technology partner, and your technology partner’s sub-processors, who handle non-employee data for your business, can answer important questions relating to the security of your confidential information.

Ask your technology provider:

  • What administrative controls do you have in place to protect your clients’ data from unauthorized access?
  • Do you employ a Zero Trust model and least-privilege and micro-segmentation principles to safeguard client data? 
  • Is each of your clients’ data physically or logically segregated from all other client data?
  • Are your control policies and procedures evaluated and tested by an independent party?
  • What security audits and examinations do you regularly undergo?
  • Is your system ISO 27001, ISO 27017, and ISO 27018 certified?
  • Does your provider conduct annual SSAE-16 SOC 2 Type 2 audits annually?
  • How many data centers do you operate and where are they located?
  • Do you have a disaster recovery site that is staffed 24/7?
  • How is your data encrypted at rest and in transit?
  • Please provide a list of your technology partners for external boundary protection, content delivery services, and protection against distributed denial of service (DDoS) attacks.
  • Please describe your Defense in Depth (DiD) approach to security control and protection.
  • Please explain how your application handles traffic prioritization and balancing.
  • How do you communicate information related to changes to the storage and handling of your clients’ data?
  • Please provide a client reference I can speak to regarding your system’s security and reliability.

Keeping your data secure

Beeline takes primary responsibility for the confidentiality, integrity, and availability of data entrusted to our care. To safeguard your data, we use a combination of administrative, technical, and physical controls to protect information from unauthorized access, use or disclosure.

 

Why we trust “Zero Trust”

Zero Trust is a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect to its systems before granting access. All of Beeline’s platform offerings are built around the Zero Trust security model, where the principle of least privilege (PoLP) mitigates the risk of unauthorized access.

From the security of your data to the success of your program, Beeline is one of the safest choices. We enforce strict security standards in all areas of our business.

Digital shield that looks like a key hole

Information security program

Beeline’s information security program is built based on the ISO 27001/2/17/18 standard and NIST 800-53 standard for policies and industry standard guidelines. In addition, Beeline employs security and compliance professionals who manage the following requirements:

  • Information security management system (ISMS)
  • Security policy creation and management
  • Infrastructure vulnerability management
  • DevSecOps vulnerability management
  • Patch management and remediation policy management
  • Threat detection and response
  • Asset risk management
  • End-point security policy management
  • Internal Penetration Testing
  • Security Awareness Training
  • SSAE 18/ISAE-3402 Type II SOC 1 and 2 compliance
  • ISO 27001/2/17/18 compliance

Physical security

In Beeline’s hosting strategy, our architecture is deployed in modern hosting solutions, whether we are using physical on-premise data centers, Microsoft Azure for our Beeline Analytics offering, or AWS for our Beeline Professional offering. We ensure your data is secure, continuously monitored, and logically and/or physically separated.

Our solutions are completely redundant and fault tolerant. All components are redundant, and all servers operate in a load-balanced, fail-over environment. If a server ever goes down, it will automatically fail over to the redundant server. Should both redundant servers fail simultaneously, our warm recovery site has all the equipment necessary to host production and disaster recovery. All data is regularly backed up in accordance with our business continuity and disaster recovery plans.

Your data security is our highest priority

We work hard to ensure that your data remains safe.

  • Beeline adheres to a rigorous year-round SSAE 18/ISAE 3402 audit process
  • Beeline’s intrusion prevention systems not only help detect and prevent breaches, but also accelerate application content delivery
  • Beeline’s Endpoint Protection Platform (EPP) is recognized as a Gartner Magic Quadrant Leader for anti-malware
  • Beeline’s Application Security Testing solutions are recognized as Gartner Magic Quadrant Leaders for improving the security posture of enterprise software
Man and woman each sitting at a desk with a computer monitor