Cybersecurity is something you shouldn’t take lightly, and your cloud-based software provider shouldn’t either. Cybercrime is a real threat, and statistics show it is only going to increase. We, at MarginPoint, recognize this threat and have taken rigorous steps to ensure our cloud-based software solution is a secure choice for all your field service management and inventory solution needs. What are these steps, and what do they mean? Continue reading to find out.
- AICPA SSAE 18 Compliance & SOC 2 Certification. The completion of this audit by the American Institute of Certified Public Accountants (AICPA) demonstrates our commitment to generate and maintain the most stringent controls for the protection and security of our customers’ confidential information. This certification verifies our company’s ability to implement the security and integrity of a system. This audit, performed yearly, ensures we are staying current with all control requirements.
- Microsoft Azure Cloud Infrastructure. MarginPoint solutions are built with a multi-tier scalable architecture design. Our platform is designed and managed in accordance with security compliance and industry best practices. We are subscribed to Microsoft’s Security Center which is a unified infrastructure security management system that strengthens the security posture of data centers and provides advanced threat protection across hybrid workloads in the cloud. All our resources such as Service fabric, SQL databases, managed instances, storage accounts, etc., are protected by Azure Security Center. We are hosted and maintained in data centers in multiple geographical All customer data is protected in the Company Hierarchy rule for logical separations and backed up by Microsoft SLA’s with a guaranteed 99.95% uptime.
- 24/7/365 Daily Backups. To ensure our services are available 24/7 365 years a day, daily backup snapshots are generated by Microsoft Azure Cloud Backup Service. This service uses encryption to back up an entire VM environment. Snapshots are kept for 30 days. Customer data is protected and backed up with a Business Continuity Plan.
- Device Specific Protocols. Single sign on is enabled to allow access to both our Inventory Management and Field Service applications. The degree of access to the applications are controlled by security roles and privileges. Our mobile applications are available in both Android and iOS smartphones or tablets.
Don’t let the fear of cybersecurity prevent your company from embracing technology and keeping up with your competitors. We are confident that the above certifications and infrastructure enable us to provide our customers with cloud-based solution that are secure, available, and safe.