AgilePoint NX
Security and Governance

Ensuring citizen development does not turn into unmanageable sprawl and IT maintains full governance throughout the citizen development lifecycle, our security practices ensures that AgilePoint NX internal controls, security, and data protection policies and procedures are at the highest levels exceeding the requirements of our customers.

AgilePoint NX
Security and Governance

Ensuring citizen development does not turn into unmanageable sprawl and IT maintains full governance throughout the citizen development lifecycle, AgilePoint is architected with multi-layered governance and security from the core and has been deployed enterprise-wide in Fortune 100 clients. Our security practices ensures that AgilePoint NX internal controls, security, and data protection policies and procedures are at the highest levels exceeding the requirements of our customers.

AgilePoint is built to exceed industry standards through its innately strong security and data foundation.


Security at the Core

AgilePoint was developed with operational and platform security as its core pillars. As such, we combine built-in safeguards with administrative controls to protect our customer's data and have monitoring capabilities embedded into every facet of the platform. AgilePoint ensures that there are multiple walls in place to prevent malicious activity and protect your data.

AgilePoint is ISO 27001 Certified


On September 1, 2021, AgilePoint received ISO 27001 certification demonstrating its commitment to protecting the integrity,
confidentiality, and availability of data.



Security and Data Protections

The AgilePoint platform has been set up as a secured cloud-hosted service in both private and public cloud infrastructure in AWS and Azure.

Privacy

We are committed to protecting our customer’s privacy and data globally.

Reliability and Performance

 AgilePoint has a global network of customer facing and platform support professionals dedicated to monitoring, risk remediation and customer issue resolution.

Governance, Security and Compliance

Cloud Security Controls

AgilePoint platform has been set up as a secured cloud-hosted service in both private and public cloud infrastructure in AWS and Azure. Customers can run their applications from their dedicated instance or a shared instance. The platform is securely deployed behind a WAF (Web Application Firewall) and segmented via VPC (virtual private clouds) and AWS security groups.


 Data in S3 buckets is encrypted and permissions are restricted based on the principle of least privilege. Versioning is enabled to recover objects from accidental deletion or overwrite. All bucket data is backed up in AWS S3 Glaciers. CloudWatch and CloudTrail logs are sent to a centralized S3 bucket for continuous logging and monitoring.

Compliance

ISO 27001 


ISO 27001:2013 is a well-known set of international standards relating to the secure management of information. AgilePoint's Platform both on-premises and on the cloud along with information systems within its corporate infrastructure has been independently verified to meet all ISO 27001:2013 standards for cloud security and information management.


SOC2 Type 2 & SOC3


AgilePoint is committed to maintaining the security of our enterprise-ready digital automation platform. Our System and Organization Controls (SOC) 2 Type II report provides assurance that Agile Point has designed, implemented, and operated to provide reasonable assurance that its service commitments and system requirements were achieved based on the trust services criteria relevant to Security (applicable trust services criteria) set forth in TSP section 100, 2017 Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy, (AICPA, Trust Services Criteria)


Configuration Management

CIS Benchmarks are followed to ensure secure configurations baselines are adhered to for each asset type. Any changes in configurations have to follow the Change Management Process.

Add your custom HTML here

Continuous Monitoring and Alerting: Incident Response

Centralized logging and continuous monitoring have been enabled to detect any potential security events. Well-defined Incident Response policies and procedures are in place to detect and prevent potential intrusion attempts.


Data Protection

All production data at rest is encrypted with AES 256 or higher. Encryption keys are rotated periodically. All data in transit is encrypted with TLS 1.2 or higher.

Secure SDLC and Penetration Testing

A secure SDLC process is followed during the entire development lifecycle based on clearly defined security requirements, threat modeling and a secure architecture. Security testing is carried out at every stage of the iterative development lifecycle and penetration testing is carried out on an annual basis and after every major release.

Vulnerability Management

Vulnerability Scans are run on a bi-weekly basis and results from the scan are triaged and prioritized based on business impact and exploitability. A prioritized patching process is implemented to remediate vulnerabilities based on the impact and severity of the vulnerability.

Privacy

AgilePoint’s software and internal practices are designed with privacy regulations compliance at the core. Our role-based security model provides a clear separation and access permission structure for the product and third parties. AgilePoint makes data governance easy, including data encryption, API, and SDK components.

Reliability and Performance

With a 24/7, 365 support infrastructure AgilePoint has a global network of customer facing and platform support professionals dedicated to monitoring, risk remediation and customer issue resolution. Our cloud customers rely on a scheduled backup&restore process, as well as continuous monitoring. AgilePoint’s customers who chose an on-premises or a private cloud implementation have access to a host of built in telemetry, and our unique “healthcheck” process performed by the certified professionals.

Are you ready to reengineer your business
automation processes?

Share by: