Workativ has implemented robust security processes and controls that are in compliance with industry-leading standards and regulations. Workativ ensures data security, operational security, and physical security on our platform with highly secure and reliable services.
Workativ is hosted in AWS VPCs in the non-promiscuous mode and further segmented for increased security and manageability.
Workativ implements role-based access through IAM that enforces segregation of duties, two-factor authentication, and end-to-end audit trails, ensuring access is in accordance with security policy.
AES 256 bit encryption with 1,024-bit key-strength for data at Rest and TLS encryption for data in transit.
AWS console login users have MFA token authentication.
Workativ uses PEM key files for server authentication.
All external HTTP requests are secured end to end.
We regularly apply malware and spam protection based on the latest threat signatures and support real-time scanning and security.
Routing rules are hardened based on pre-established criteria for various permissible transactions across all resources.
Secure administrative tunnel with whitelisted IP addresses for secure connection to the servers for administrative purposes, through a bastion host.
Workativ provides secure transactions with end-to-end encryption and secure server-to-server file transfers.
Workativ provides port-based and IP based access to the server for the whitelisted IPs.
Our database servers remove connection attempts or access from the Internet.
We monitor AWS console user log events.
We monitor Service and Application logs through alerts.
We update server and security patches regularly.