Taylor Martin

  • Total activity 35
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 19

Articles

Recent activity by Taylor Martin Recent activity Votes
  • Do you employ penetration testing?

    Certn employs third-party experts to perform detailed penetration tests on our core applications in addition to the internal scanning and testing exercises to ensure a good security posture.

  • How do you monitor security threats?

    We employ Security Incident Event Management (SIEM) tools to collect and correlate logs from different application, network and host systems. This alerts on triggers to notify the Security team bas...

  • What are your encryption methods?

    At rest: Sensitive customer data at rest is encrypted using 256-bit Advanced Encryption Standard (AES).  In transit: All customer data is protected using strong encryption protocols. We ensure all ...

  • How long do you keep data and what happens when it is deleted?

    Data collected by Certn is retained for a time period agreed on by both parties and deleted thereafter. However, once deleted, data cannot be restored Note:This applies to all data collected by Cer...

  • What happens in the case of a security incident?

    In the event of an incident, events are to be escalated to our CSIRT (computer security incident response team) which involves personnels from the  Product, PR, Operations, Engineering, and Securit...

  • How can I book a demo?

    We'd love to show you what Certn is all about! If you'd like a demo of Certn please select one of the below links to book a time based on expected volume: I will be doing less than 20 checks a mon...