Skip to content

 

Security Overview

Keeping your data secure, confidential, and readily accessible are our greatest priorities. MarginEdge’s information security program is based on the concept of Defense in Depth: securing our organization and your data at every layer.

soc2Our cybersecurity program aligns with SOC2 security standards. While no system can guard against every potential threat, MarginEdge’s defensive line is advanced and monitored 24/7, 365 days a year. 

 

Request security documents >

AWS infrastructure
Infrastructure AWS

MarginEdge is a cloud-native SaaS organization.

Infrastructure security
Infrastructure Infrastructure Security

MarginEdge relies on the Amazon Web Services (AWS) Shared Responsibility Model to ensure the security of the underlying infrastructure that is provided by AWS.

More on the AWS model

Separate production environment
Infrastructure Separate Production Environment

MarginEdge practices proper data hygiene procedures, separating our Production environment, and all other environments.

Vulnerability and patch management
application security Vulnerability & Patch Management

MarginEdge and its supporting data security infrastructure are frequently reviewed for potentially harmful vulnerabilities.

We use industry-recognized, third-party security specialists, enterprise-class security solutions, and custom in-house tools to regularly analyze the application code and production infrastructure to ensure that all vulnerabilities are identified and swiftly mitigated.

Backups enabled
data security Backups Enabled

Customer data is backed up regularly using automated backups. MarginEdge tests the integrity of backup data by regularly performing automated data restoration processes. Our backups are encrypted using industry-standard cryptography for extra protection.

Encryption in transit
data security Encryption at rest and in transit

All data at rest is encrypted at the database layer. All data transmitted between MarginEdge clients and the MarginEdge Application uses strong encryption protocols. MarginEdge supports the latest recommended secure cipher suites to encrypt all traffic in transit, including the use of TLS 1.2 or greater protocols.

Email protection
corporate security Email Protection

All MarginEdge team members are trained to be vigilant and look out for phishing attempts, and report them to the MarginEdge IT team.

Employee training
corporate security Employee Training

All MarginEdge team members are required to participate in ongoing cybersecurity awareness training quarterly and annually.

Incident response
corporate security Incident Response

MarginEdge maintains a documented internal incident response plan and a team of incident response professionals to respond to system alerts and events, including security events. Should a cybersecurity incident occur, MarginEdge will notify impacted customers in a timely manner.

Internal single sign on
corporate security Internal SSO

MarginEdge uses SSO internally for our employees to minimize the risk of password reuse.

MarginEdge Security Documents

The following documents are available upon request:

📄  MarginEdge security program overview

📄  Penetration test results

📄  Certificate of cybersecurity insurance

📄  SOC2 Type I report

📄  Information Security Policy

Request security documents: