top of page

SECURITY

At Persilient, keeping our clients’ data secure is our priority. We use cloud security tools and implement rigorous processes to offer robust product security.

ENCRYPTION

Our system keeps your data protected at all times. It uses TLS 1.2 and AES 256 encryption methods to secure your data both in transit and at rest.

INFRASTRUCTURE

Our system uses AWS as a hosting provider. AWS holds many certifications such as ISO 27001, SOC2, PCI DSS, FedRAMP, and provides for a safe and secure environment.

Frequently Asked Security Questions

How does Persilient ensure a resilient service?
Our system and protocol uses AWS as a host provider as well as uses several availability zones to make sure that we cover every call.

Does Persilient have an Information Security Program?
Our system's Information security program is based on the concept of defense in layers. Our security program is aligned with ISO 27001 and SOC II standards and is constantly evolving to follow new industry best practices.

Does your system Backup my data?
Our system performs regular backups of its customers’ information across availability zones.

What measures does your system implement to protect against Web Application Threats?
Our system performs penetration tests and engages independent third-party entities to conduct application-level penetration tests on a regular basis. Our system also runs a bug bounty program.

bottom of page