Taylor Martin

  • Total activity 35
  • Last activity
  • Member since
  • Following 0 users
  • Followed by 0 users
  • Votes 0
  • Subscriptions 19


Recent activity by Taylor Martin Recent activity Votes
  • What is your network security plan?

    We have designed network security and monitoring techniques to provide different layers of protection and defense. We have security controls in place to protect our network from unauthorized access...

  • What physical security measures are in place?

    Here at Certn, we run our business on the AWS cloud platform . This cloud service provider is responsible for security of the physical data centers and other hardware that power the infrastructure....

  • Do you perform static code analysis?

    Yes. Our source code repositories are scanned for security issues via our static analysis tooling. The devops and security teams work together to verify the checks and perform manual testing to mak...

  • What dynamic vulnerability measures are in place?

    We employ automated scanners to continuously and dynamically scan our core applications for potential exploitable vulnerabilities. By conducting these scans, different security risks are averted.  ...

  • Do you employ penetration testing?

    Certn employs third-party experts to perform detailed penetration tests on our core applications in addition to the internal scanning and testing exercises to ensure a good security posture.

  • How do you monitor security threats?

    We employ Security Incident Event Management (SIEM) tools to collect and correlate logs from different application, network and host systems. This alerts on triggers to notify the Security team bas...

  • What are your encryption methods?

    At rest: Sensitive customer data at rest is encrypted using 256-bit Advanced Encryption Standard (AES).  In transit: All customer data is protected using strong encryption protocols. We ensure all ...

  • How long do you keep data and what happens when it is deleted?

    Data collected by Certn is retained for a time period agreed on by both parties and deleted thereafter. However, once deleted, data cannot be restored Note:This applies to all data collected by Cer...

  • What happens in the case of a security incident?

    In the event of an incident, events are to be escalated to our CSIRT (computer security incident response team) which involves personnels from the  Product, PR, Operations, Engineering, and Securit...

  • How can I book a demo?

    We'd love to show you what Certn is all about! If you'd like a demo of Certn please select one of the below links to book a time based on expected volume: I will be doing less than 20 checks a mon...