In order to protect our assets and integrity, as well as the integrity of our end users, SimplyCast has a strong focus on security for the SimplyCast application.
There are four concepts that are core to a secure SimplyCast application:
- Authentication: Identifying an entity (person, computer, etc.) that wants to access something which is secured.
- Authorization: Determining what an entity is allowed to see and do. Authorization might also be thought of as “permission.”
- Logging and auditing: Logging for the SimplyCast application occurs at many touchpoints including all areas where SimplyCast talks to an outside system. This logging helps with auditing security and determining if there have been any unauthorized accesses.
- Endpoint security: Determining that the endpoints being utilized, both inbound and outbound, are all transferring data securely and have been properly authenticated.
There are five major parties that all contribute to overall SimplyCast application security:
- SimplyCast application: Security starts at home. The SimplyCast application itself has a number of security features designed to safeguard against data breaches, such as account ownership, individual user access control, and a full permissions system.
- Servers the SimplyCast application is hosted on: All access control is handled by time-tested, deny-by-default firewall practices. The outside world may only access the SimplyCast application through predesignated portals, such as the SimplyCast web portal.
- Database servers: Database servers are locked to only permit access from very specific locations with proper authentication.
- Employees who interact with the data: Employees are signed to strict agreements related to data integrity. Due to our strict data access policies, employees are only given access to information relevant to their day to day operations.
- Third parties: Any outside parties are only given access to the information required to perform their functions.