Hamburger icon
LoginStart your free trial

Security

At Lyceum Technologies Inc,, serving our customers with high availability and secured products is of our utmost concern. We are unswerving towards the quality and experience of our customer business and data, and take full accountability to ensure that our customers are well-versed about the processes and measures we have undertaken to secure their interests, all the while upholding customer privacy. We are also SOC 2 Type II certified service provider.

Data Protection

  • Virtual Private Cloud
  • Role-based access
  • Data and Network Encryption
  • Physical and Network Security

Product Security

  • Secure Development Process
  • Product Roadmap
  • Version controls
  • Production Access Controls

Resilient and Reliable Architecture

  • Replication
  • Data backup
  • Capacity Management
  • Monitoring

Data Protection

Virtual Private Cloud

Customer data is stored in a secure Virtual Private Cloud (VPC) hosted in Amazon Web Services. VPC is further segmented for security and manageability.

Role-based access

Users are restricted to accessing only the required information and systems that are necessary to perform their job. This effectively enforces segregation of duties.

Data and Network Encryption

Data in transit and Data in rest are both encrypted. Communication is encrypted using TLS 1.2 for secured transmission.

Physical and Network Security

Our platform is hosted in data centers that comply with most of the global IT standards. Some of those are CSA, ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3. All access to the data centers are tightly controlled and monitored 24 hours per day. Access to our office is restricted to authorized users only. The facility is monitored 24 X 7.

Product Security

Secure Development Process

All the changes in the product are put through a code review and security analysis process and tested by the Quality Team before the changes are released, ensuring the product quality and security.

Product Roadmap

We follow an agile process for development. Each and every feature is well defined and given appropriate priority for the development. Security requirements are given the highest priority and are fixed as soon as possible.

Version controls

We use cloud version control systems to manage our source code. Product versions are tagged and maintained in the access restricted branches.

Production Access Controls

Production access is restricted to a very few people based on their roles and responsibilities. Access controls are defined and executed for each and every role based on a need-to-know basis.

Resilient and Reliable Architecture

Replication

All our components are replicated in multiples across different availability zones. All our components are in real-time active-active mode and serving the traffic.

Data backup

Data is replicated in n+1 and the replications are in act ive-active mode. We also take automated backup every day.

Capacity Management

We have an on-demand capacity expansion where limits are set liberally. We also proactively monitor and upgrade our thresholds. On-demand capacity expansion is in near real-time as provided by our hosting partner.

Monitoring

Tools are in place to proactively monitor the health and security of our systems. Our monitoring tools notify our infra and security teams to act upon them, if there is an anomaly in the system.