At ThinkSmart Security is Everything and Everything is Security.
ThinkSmart Platform Security
We understand that technological innovation and change means that there is increasing need for the highest levels of security. From the operational to strategic; Prevention, Detection, Protection and the Safeguarding of our customer data is always a considered and managed factor.
Our network architecture has been hardened to PCI (Payment Card Industry ) DSS (Data Security Standards) and beyond as we strive to keep ahead of the latest threats and attacks. Our specialized team of security experts operate in conjunction with third party auditors to ensure that environments remain secure, correctly managed and maintained through daily auditing, weekly reporting and quarterly full network reviews. Such is the security program in place at ThinkSmart that Security is not just considered the responsibility of one department but more so that the entire employee body engages in industry best practices. Interdepartmental testing, auditing and training all combine to put the ThinkSmart security program at the cutting edge of security standards.
Applications & Access
- Formal code reviews and vulnerability mitigation by third parties
- Automated code vulnerability scanning in use to ensure secure coding of TAP applications
- Application level Advanced Encryption Standard (AES) 256 bit encryption
- Managed Virtual Private Cloud with constant firewall monitoring
- Key Management & Encryption Program
- Enterprise-grade malware protection
- Multiple authentication mechanisms
Transmission & Storage
- Secure, private SSL 256 bit viewing session
- Customer configurable data retention program – provide 99.999999999% durability and 99.99% availability of objects over a given year.
Hardware & Infrastructure
- Two geo-dispersed, ISO27001, Level 1 Service Provider Payment Card Industry (PCI) Data Security Standard (DSS), SOC1, DIACAP Level 2 audited and certified data centers
- Near real-time secure data replication and encrypted archival
- 365x24x7 on-site security
- Annual Business Continuity Planning (BCP) & Disaster Recovery (DR) testing
- Third-party penetration testing and external data center audits
- Data center access restricted on a need to access basis.
- Employees and contractors required to present identification, sign in and are escorted by security staff.
- Access reviewed periodically
- Physical access is controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems and other electronic means.
- Authorized staff utilize multi-factor authentication mechanisms to access data center floors.
- Environmental controls such as fire detection and suppression systems, air conditioning and humidity monitoring systems, uninterruptible power supply (UPS) units, and generators are in place to protect assets located within the data centers.
- Fire Detection and Suppression – Automatic fire detection and suppression equipment has been installed to reduce risk.
- The fire detection system utilizes smoke detection sensors in all data center environments, mechanical and electrical infrastructure spaces, chiller rooms and generator equipment rooms.
- These areas are protected by either wet-pipe, double-interlocked pre-action, or gaseous sprinkler systems.
- Power – The data center electrical power systems are designed to be fully redundant and maintainable without impact to operations, 24 hours a day, and Uninterruptible Power Supply (UPS) units provide back-up power in the event of an electrical failure for critical and essential loads in the facility.
- Data centers use generators to provide back-up power for the entire facility.
- Climate and Temperature – Climate control is required to maintain a constant operating temperature for servers and other hardware, which prevents overheating and reduces the possibility of service outages.
- Data centers are conditioned to maintain atmospheric conditions at specified levels. Personnel and systems monitor and control temperature and humidity at appropriate levels.
Systems and Operations
- Physically and logically separate networks
- Two-factor, encrypted VPN access
- Professional, commercial grade firewalls and border routers to ensure access is only available to those permitted
- Distributed Denial of Service (DDoS) mitigation
- Protection against Man in the Middle (MITM) attacks, IP spoofing, port scanning, packet sniffing
- Active monitoring and alerting
- Periodic patching at OS and Third Party Application level to harden system security.
- Systems configured to search for an patch according to the latest security threats identified
- Data protection through various encryption techniques and network design
- PCI-DSS, HIPAA and ISO 27002 based policies and procedures, which are regularly reviewed, audited and assessed by multiple members of ThinkSmart Security Team
- Encryption for all administrative traffic (HTTP, SFTP, SSH)
- Employee security training program, clean desk, acceptable use and VPN usage training in place.
- Repository of certificates of training completion stored in ThinkSmart archives
- ThinkSmart development team undergo annual OWASP training
- Role based access control practiced throughout the ThinkSmart hierarchy.
- Access granted on a need to know basis and permission requests tracked and reviewed periodically
- Systems access logged and tracked for auditing and compliance purposes. Database change logging in place for auditing
- Secure media destruction procedures in place (According to NIST and DOD standards proceeded by shredding by certified, CCTV monitored vendor)
- Secure document removal and destruction policies for all critical and sensitive information
- Fully documented change management procedures in compliance with PCI-DSS standards
Policies and Procedures
- Employee access to private data is prohibited with strict penalties applied should they do so
- Customers retain ownership of their data
- 24/7 monitoring, escalation procedures, disaster recovery and crisis recovery plans in place and tested periodically
- Security program which reacts to changes in security landscape by altering company policies, procedures and controls to mitigate new risks
- All ThinkSmart TAP application users verified by email
The power trio Mary O'Carroll of Google, Connie Brenton of NetApp and Stephanie Corey of Flex.×