Security at Epoch

SecurityProgramHighlights 1

Security Program Highlights

DataSecurity 2

Data Security

Epoch Solutions Group encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.

ApplicationSecurity 2

Application Security

Epoch Solutions Group regularly engages some of the industry’s best application security experts for third-party penetration tests.

InfrastructureSecurity 2

Infrastructure Security

Epoch Solutions Group uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.

SOC 2 Type 1 Certified Compliance

SOC2 Type I

Service Organization Control (SOC) 2 is a procedure designed to ensure that service providers can securely manage data to protect the interests and privacy of their clients. Successfully completing a SOC 2 Type 1 report shows that we have validated best practices in place. Our security processes have been independently inspected and confirmed as meeting the trust services criteria set by the American Institute of Certified Public Accountants. This means that Epoch Solutions Group has the controls and structures in place to ensure that we meet the security standards our customers expect when it comes to their data.

Questions About Security?