There's secure. And then there's Soonr Secure.
Learn how Soonr is designed to keep your
business data safe. Get it now >
We Take Your Business Security Seriously
Soonr is serious about the security of your information.
That is why we take a holistic approach towards security,
incorporating a variety of structures and mechanisms at
various layers within the Soonr service architecture.
click to enlarge
Active Directory Integration for User Authentication
Simplified management through centralized user authentication and account control
Enterprise-class account management and authentication for users and groups is supported within Soonr through the
Active Directory Integration feature, which is available as part of the Enterprise plan. This feature enables IT personnel
to import user and group account metadata from Active Directory into Soonr, and to force all Soonr user authentication
through Active Directory. Click Here To Download The Complete Security Report >
Dedicated Geo-Redundant Data Center Infrastructure
Built upon a dedicated resilient infrastructure ensuring isolation from unrelated services:
All Soonr service hardware and software in each Data Center is 100% owned, operated, and managed by Soonr.
With the dedicated Data Center approach that Soonr has invested in, nothing operates on any Soonr hardware or
software processing or storage platform except the Soonr service. True 100% dedication of the Soonr service therefore
eliminates the possibility of experiencing any service interruption, performance degradation, or malware infection that
might otherwise be caused by adjacent applications. Combined with multi-level regional and Data Center redundancy,
the Soonr infrastructure represents one of the most secure, reliable, and available cloud service architectures available today.
Click Here To Download The Complete Security Report >
SAS 70 / SSAE 16 Certification
Establishes a certified foundation for the processing of sensitive information:
Soonr is certified against SAS 70/ SSAE 16 requirements for attestation and auditing, thus providing assurances
regarding adequate oversight over the controls utilized in the processing of information. In this manner, the
Soonr infrastructure can serever as a foundation upon which end-customers can build their SAS 70 / SSAE 16
compliant data processing and storage policies and practices. Click Here To Download The Complete Security Report >
Multi-faceted traffic regulation, monitoring, and
risk assessment protects against dynamic threats
Built upon the secure foundation described above, Soonr also implements
a variety of independent strategies intended to continuously guard against,
monitor, and assess potential security risks. All Soonr application servers
are protected with OS security modules that apply Discretionary Access
Control and Mandatory Access Control policies to all server processes,
thus ensuring that no software process can be gainfully subverted.
Extensive auditing and reporting capabilities to ensure compliance with company policies
Beyond privacy-oriented security features such as encryption, access policies, and account management,
Soonr implements a set of advanced reporting capabilities that are specifically designed to support auditing
for compliance with company policies. These advanced reporting features, which are available as part of the
Enterprise plan, enable Admins to generate and export custom reports in order to establish audit trails and
analytics on the following types of events. Click Here To Download The Complete Security Report >