Contact Us Today to Learn More
How we keep our data secure
Blue Sentry Cloud practices what we implement for our customers. Our technologies, policies, and procedures meet or exceed industry standard requirements. Our team of security and compliance experts enable us to meet or exceed rigorous privacy and security standards. Our vendors must, at minimum, comply with industry standards as well.
AWS supports more security standards and compliance certifications than any other offering, including PCI-DSS, HIPAA/HITECH, FedRAMP, GDPR, FIPS 140-2, and NIST 800-171, helping customers satisfy compliance requirements for virtually every regulatory regime around the globe.
All employee and customer data with BSC and approved vendors is encrypted at rest and all traffic is encrypted in transit using TLS SHA-256 with RSA Encryption.
Contact Us Today to Learn More
Featured Technology Partners
We engage class-leading enterprise technologies to deliver one-stop solutions that are automated, secure, and scalable.
Security and Compliance programs
All BSC employees go through a thorough background check before hire.
Our practice is to retain only the minimum amount of customer data in order for us to serve our customers. We limit internal access to properly cleared employees on a “need-to-know” basis. All employees are trained on security and data handling procedures to ensure that they uphold our strict commitment to the privacy and security of our customers’ data.
All employees sign a confidentiality, non-disclosure and security agreement before beginning work with Blue Sentry.
Reliability and Redundancy
Business continuity and disaster recovery
Blue Sentry has business continuity and disaster recovery plans in place that replicate our systems and is tested regularly.
Software Development Lifecycle
Blue Sentry Cloud continuously scans our systems for security vulnerabilities which will alert our team to take the appropriate action. Additionally, we audit our access to systems regularly.
We secure our employees’ machines and laptops using mobile device management to ensure that each device follows our information security standards, including encryption.
Malicious Software Prevention
Our employees’ equipment is defended by industry-leading, next-generation anti-malware software. We also conduct routine phishing, social engineering, and penetration tests to further educate and train employees.
We keep our systems up to date with the latest security patches and continuously monitor for new vulnerabilities through compliance and security mailing lists. This includes automatic scanning of our code repositories for vulnerable dependencies.
Application Security Measures
Authentication – Login credential protection
Blue Sentry Cloud supports SAML-based Single sign-on (SSO) with 2-factor authentication (2FA).
Certifications and Compliance
SOC 2 Type 2
SOC 2 is the gold standard for security compliance. We have obtained SOC 2 Type 2 certification for our commitment to establish and follow security policies and procedures.
We are PCI compliant through our payment processor which encrypts and stores credit card details.