Your security is our priority

At ZenterPrize, protecting your data is our top priority. We are fully dedicated to ensuring the security of our users’ intellectual property and the protection of sensitive information, such as keys, tokens, PII, and credentials..

Organization security

Penetration testing

We perform an independent third-party penetration at least annually to ensure that the security posture of our services is uncompromised.

Security training

Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.

Staff security

All new team members must sign a standard confidentiality agreement and undergo background checks to ensure a secure work environment, in line with local regulations.

Cloud security

Vulnerability testing

We perform vulnerability scanning and actively monitor for threats at least quarterly.

Data at rest

All databases in our system are encrypted at rest, providing strong data security even during periods of inactivity.

Response plan & recovery

We reduce data loss risk with hosting provider backups and timely monitoring. Plus, we maintain a secure incident response plan.

Access security

Permission & authentication

Access to production cloud infrastructure and other sensitive tools are limited to authorized personnel who require it for their role.

Access reviews

We perform quarterly access reviews of all team members with access to sensitive systems.

Password managers

All company issued laptops/desktops utilize a password manager for team members to manage passwords and maintain password complexity.

Vendor & risk management

Vendor risk assessment

We undergo at least annual risk assessments to identify any potential threats, including considerations for fraud.

Vendor risk management

Vendor risk is determined and the appropriate vendor reviews are performed prior to authorizing a new vendor.