At ZenterPrize, protecting your data is our top priority. We are fully dedicated to ensuring the security of our users’ intellectual property and the protection of sensitive information, such as keys, tokens, PII, and credentials..
We perform an independent third-party penetration at least annually to ensure that the security posture of our services is uncompromised.
Security training
Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
Staff security
All new team members must sign a standard confidentiality agreement and undergo background checks to ensure a secure work environment, in line with local regulations.
Cloud security
Vulnerability testing
We perform vulnerability scanning and actively monitor for threats at least quarterly.
Data at rest
All databases in our system are encrypted at rest, providing strong data security even during periods of inactivity.
Response plan & recovery
We reduce data loss risk with hosting provider backups and timely monitoring. Plus, we maintain a secure incident response plan.
Access security
Permission & authentication
Access to production cloud infrastructure and other sensitive tools are limited to authorized personnel who require it for their role.
Access reviews
We perform quarterly access reviews of all team members with access to sensitive systems.
Password managers
All company issued laptops/desktops utilize a password manager for team members to manage passwords and maintain password complexity.
Vendor & risk management
Vendor risk assessment
We undergo at least annual risk assessments to identify any potential threats, including considerations for fraud.
Vendor risk management
Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.