Select Page
< All Topics
Print

Network Security

Innovation Minds is dedicated to the highest standards of security for our data center and network infrastructure. We implement a comprehensive array of robust security protocols and practices to ensure the protection of your data. By employing advanced encryption technologies, continuous monitoring, and regular security audits, we safeguard the integrity of your information and maintain the uninterrupted availability of our services. Our commitment to security extends to every aspect of our operations, providing you with the confidence that your data is always protected with the utmost care and diligence.

 

Physical Security

Facilities

Innovation Minds’ applications are hosted by Amazon Web Services (AWS). AWS’s global data center infrastructure is designed to ensure the highest level of performance and availability. AWS engages with external certifying bodies and independent auditors to provide considerable information regarding policies, processes, and controls, resulting in certifications, audit reports, or attestations of compliance such as SOC 2, ISO 27001, and GDPR.

On-site Security

Our data center facilities feature a secured perimeter with multi-level security zones, 24/7 manned security, CCTV video surveillance, multi-factor authentication mechanisms for access control, and security breach alarms. Learn more about AWS’s Data Center Controls.

Monitoring

All Innovation Minds infrastructure, network systems, and devices are constantly monitored and logically administered by Innovation Minds staff. Physical security, power, and internet connectivity are monitored by the individual facility providers.

Location

Innovation Minds leverages AWS Regions within the United States, India, and the European Union.

 

Network Security

Security Team

Our Security Team is on call 24/7 to respond to security alerts and events.

Protection

Our network is protected by redundant networks, best-in-class router technology, secure HTTPS transport over public networks, and regular audits.

Architecture

Our network security architecture consists of multiple security zones. More sensitive systems, like database servers, are protected in our most trusted zones. Other systems are housed in zones commensurate with their sensitivity, depending on function, information classification, and risk. Depending on the zone, additional security monitoring and access controls apply. DMZs are utilized between the Internet and internally between the different zones of trust.

Network Vulnerability Scanning

Network security scanning gives us deep insight for quick identification of out-of-compliance or potentially vulnerable systems.

Third-Party Penetration Tests

In addition to our extensive internal scanning and testing program, each year Innovation Minds employs independent third-party security experts to perform penetration testing across Innovation Minds’ Production Network.

Security Incident Event Management (SIEM)

Our Security Incident Event Management (SIEM) program monitors logs from important network devices and host systems and alerts on triggers that notify the Security team for investigation and response.

Anti-Malware

Innovation Minds uses industry-leading anti-malware solutions to protect against threats including malware, viruses, Trojans, and spyware. New anti-malware patterns and updates are applied frequently to ensure protection against the latest threats.

Data Loss Prevention

Innovation Minds has implemented data loss prevention tools that ensure control of USB and peripheral ports and detect and prevent potential data breaches and data ex-filtration by monitoring, detecting, and blocking sensitive data in motion and at rest.

Threat Intelligence Program

Innovation Minds participates in several threat intelligence sharing programs. We monitor threats posted to these threat intelligence networks and act based on our risk and exposure.

Logical Access

Access to Innovation Minds networks is restricted by an explicit need-to-know basis, utilizes least privilege, and is frequently audited and monitored. Multi-factor authentication is required for accessing our production networks.

Security Incident Response

In case of a system alert, events are escalated to our 24/7 teams providing Operations, Network Engineering, and Security coverage. Employees are trained on security incident response processes, including communication channels and escalation paths.

 

Encryption

Encryption in Transit

Communications between you and the Innovation Minds application servers are encrypted via HTTPS and Transport Layer Security (TLS 1.2 or higher) over public networks. TLS is also supported for the encryption of emails.

Encryption at Rest

All client data is secured but not yet encrypted. This can be added on demand.

 

Availability & Business Continuity

Uptime

Innovation Minds maintains an on-demand available system status webpage that includes system availability details, scheduled maintenance, service incident history, and relevant security events.

Redundancy

Innovation Minds employs service clustering and network redundancies to eliminate single points of failure. Our backup program ensures Service Data is actively replicated across primary and secondary systems and facilities.

Business Continuity/Disaster Recovery

Our Business Continuity (BC) and Disaster Recovery (DR) programs ensure that our services remain available or are easily recoverable in the case of a disaster. This is accomplished through building a robust technical environment, creating Business Continuity and Disaster Recovery plans, and regularly scheduled testing.