360-degree security

BizAway cares about security, that’s how we protect your personal data.

Application
Security:

  • Data encryption In-transit 
  • Frequent vulnerability scanning
  • Periodic penetration testing
  • Disaster recovery
  • Incident management

Business continuity and technical security

Our platform and our services have various measures in place to always guarantee a high availability service.

We mitigate cyber threats through Endpoint Detection & Response (EDR) technology.

Policies, certifications and payment security

BizAway complies with several security policies, including the security of information policy.

We are currently working on obtaining the ISO 27001 certification, the international standard that describes the best practices on information security.

Our infrastructure is hosted by AWS whose standard is ISO 27001 and SOC 2. All customer payment information is entrusted to an external PCI-DSS-compliant provider.

Data protection & GDPR

We are Data protection & GDPR compliant, read more at the links below:

Data processing agreement
Privacy & Cookies Policy
Terms & Conditions

Physical security

Our offices are protected by alarms and security checks 24/7.

Team, access control and third-party vendors

Our dedicated team is responsible for ensuring the safety of all our clients with continuing education and special protocols. We take care of ensuring the protection of our clients’ data throughout the BizAway environment.

Our system access technique is role based access control; this means that only some people can access the resources and only those strictly necessary for the performance of their business duties.
We constantly monitor the correctness of the permissions assigned, checking that there are no unauthorised accesses.

AWS access keys are changed at regular intervals and all users use 2-factor authentication.
Additionally, through AWS Firewall, we periodically check roles and access permissions to make sure they are still in line with policies.

We carry out security checks and risk assessments to all our suppliers who host confidential data of our clients. Furthermore, we keep track of the use of data by our suppliers through constant monitoring.

Do you have any questions?

You can have all the additional answers or documentation you need through your sales representative.

We are sure we have a solution for you.
Request a free trial.

This website only uses analytical and session cookies to provide a better browsing experience.
See our Cookies and Privacy Policy for further information.