♦Customer data is securely hosted on AWS, with region-specific hosting based on your requirements.
♦Continuous network monitoring and protection to detect and prevent threats.
♦Real-time application security monitoring to prevent vulnerabilities.
♦End-to-end encryption for data in transit (TLS 1.2, TLS 1.3) and at rest (AES-256).
♦Deployment of Web Application Firewall (WAF) to block malicious traffic.
♦Regular vulnerability scans and penetration testing to proactively identify and address risks.
♦Annual disaster recovery testing and business continuity planning to ensure seamless operations.
♦Advanced monitoring and alerting systems to detect potential security threats.
♦Security awareness training for all employees to recognize risks and prevent breaches.
♦Regular phishing simulations and cybersecurity training to ensure vigilance.
♦Robust vendor risk management to assess third-party security measures.
♦Continuous malware protection and asset management to safeguard company systems.
♦Strict access control policies across all internal software and infrastructure.
♦Comprehensive incident response procedures for swift action against security threats.
♦Structured employee onboarding and offboarding protocols to maintain security integrity.
♦Strong user authentication with complex password enforcement and support for AD based Single Sign-On (SSO) and other SAML-enabled applications.
♦Granular access controls allow businesses to define permissions and manage user roles effectively.
♦Secure external content sharing through temporary and permanent links with access restrictions.
♦Data Privacy
♦GDPR, US Privacy Laws, ATIPPA
♦SOC 2 Compliance
♦Risk Management
♦Multiple ISO Certification
At Bazaar Insights, we prioritize security and data privacy by adhering to the highest industry standards and global regulations. Our commitment to compliance ensures that your business operates securely and transparently
We have a dedicated compliance team to review procedures and policies to align them with standards, and to determine what controls, processes, and systems are needed to meet the standards. This team also does periodic internal audits and facilitates independent audits and assessments by third parties.
For more details, please contact us.
Bazaar Insights complies with major data protection regulations, including:
♦ General Data Protection Regulation (GDPR)
♦ ATIPPA (Access to Information and Protection of Privacy Act)
♦ All U.S. data protection regulations, including CCPA and CPA.
Bazaar Insights is certified in multiple ISO certifications, demonstrating our commitment to best practices in information security management, including:
♦ ISO/IEC 27001
♦ ISO/IEC 27701
♦ ISO/IEC 27017
♦ ISO/IEC 27018
♦ ISO/IEC 20000
♦ ISO 9001:2015
♦ ISO 22301:2019
At Bazaar Insights, we take proactive steps to ensure the highest levels of security for our infrastructure. We conduct regular audits and assessments of our cloud service providers to maintain compliance with industry standards
All Bazaar Insights data is securely hosted on Microsoft Azure across multiple regions to enhance reliability and redundancy. Our current data hosting locations include:
We control access to our resources (buildings, infrastructure and facilities), where accessing includes consumption, entry, and utilization, with the help of access cards. We provide employees, contractors, vendors, and visitors with different access cards that only allow access strictly specific to the purpose of their entrance into the premises. Human Resource (HR) team establishes and maintains the purposes specific to roles. We maintain access logs to spot and address anomalies.
♦ Ireland
♦ Germany
♦ US East
♦ Canada Central
Bazaar Insights employ technical access controls and internal policies to prohibit employees from arbitrarily accessing customer data. We adhere to the principles of least privilege and role-based permissions to minimize the risk of data exposure.
Access to production environments is maintained by a central directory and authenticated using a combination of strong passwords, two-factor authentication, and passphrase-protected keys. Furthermore, we facilitate such access through a separate network with stricter rules and hardened devices. Additionally, we log all the operations and audit them periodically.
To safeguard against cyber threats, Bazaar Insights maintains 24/7 monitoring and a robust incident response system. Our proactive approach enables us to detect, contain, and resolve potential threats in real-time while continuously improving security measures based on ongoing assessments.
We have a dedicated incident management team. We notify you of the incidents in our environment that apply to you, along with suitable actions that you may need to take. We track and close the incidents with appropriate corrective actions. Whenever applicable, we will identify, collect, acquire and provide you with necessary evidence the form of application and audit logs regarding incidents that apply to you. Furthermore, we implement controls to prevent recurrence of similar situations.
We respond to the security or privacy incidents you report to us through incidents@bazaarinsights.com, with high priority. For general incidents, we will notify users through our blogs, forums, and social media. For incidents specific to an individual user or an organization, we will notify the concerned party through email (using their primary email address of the Organisation administrator registered with us).
Business continuity is a top priority, and we guarantee 99.8% platform availability through a comprehensive disaster recovery (DR) and business continuity plan (BCP). Regular recovery drills, backup management, and failover mechanisms ensure uninterrupted operations. Service Level Agreements (SLAs) define recovery time objectives, allowing us to respond swiftly to any disruptions.
Security is embedded in our company culture. We provide ongoing security awareness training for employees and contractors, conduct quarterly phishing tests, and implement advanced malware detection systems to protect against internal and external threats. Regular security audits and risk assessments help us refine our security posture, ensuring we stay ahead of evolving risks while keeping our clients' data safe.