A Fortified Infrastructure
Enterprise mobile security isn’t just about sending secure messages, but making sure that data is protected from end-to-end and ensure service availability at all times. That’s why we’ve implemented the following processes and safeguards:
Messages flowing via the TeleMessage Archive router are AES 256 ALE encrypted end-to-end: in transit and at rest.
Encryption Management and maintenance are performed autonomously. Message encryption is done by HashiCorp Vault in a transparent manner for encryption key management, generation, rotation. While for file encryption we are utilizing Portworx which communicates with HashiCorp via API for seamless file encryption.
The TeleMessage Kafka Queue is encrypted within a Kubernetes cluster on its way to the Company’s archive (volume is encrypted by Portworx as well).
TeleMessage uses its own private cloud platform.
Information is stored in SSAE-16 SOC2 certified hosting facilities.
VMWare infrastructure to ensure high service availability across multiple hardware platforms.
Secure design with separation of user access and data storage.
Checkpoint Firewalls for site protection, deep protocol inspection, DDoS protection, IPS and more.
F5 LTM and ASM (Load Balance and Application Firewall) for content filtering, DDoS and Web Application Firewall.
HTML Encoding and Anti-Script Injections: to prevent users from sending messages or pages that generate activities on subscriber PC’s. All severs implement HTML Encoding and Anti-Script injections.
Systems hardening procedures and policies.
Secure Client-Server Communication: communication between client and server is locked by encrypted protocol using TLS.
IP tracking: the system logs access attempts and record IP address where they originate from. Client can configure to allow access from certain IP address ranges.
Message Limitation: allows us to set the number of maximum messages per period (day/month), and maximum recipients per message.
Fraud Detection: the system detects repeated failed access of password hacking and automatically locks the suspected accounts. The original account user will receive a notification about the attempt and will have to change password or contact support to release account lock.
Our 24×7 NOC team uses various monitoring systems to ensure service availability and security including: server performance thresholds to provide high SLA at all times and log managers to analyze application behavior and provide ability to predict failure or service degradation ahead of time.
Verified & Certified
TeleMessage successfully passed the information security audit by DELOITTE, they’ve assessed our security policies and procedures, including corporate physical security, information security within our systems, system protections such as firewalls and password protection, business continuity and business interruption plans. Furthermore, we’ve been consulted by APPSEC during the development stage to minimize security threats and ensure application integrity.
TeleMessage is an ISO Certified Vendor
Click the icons below to view our ISO certificate
Policies & Protocols
It’s clear that organizations that have good security habits share certain traits that are lacking in organizations that don’t do information security well. What are these good security habits and how can you learn more? We’ve compiled a list of the 10 Best Practices of Enterprise Security based on our own security policies and procedures implemented to safeguard sensitive customer information. These practices address dimensions of information security such as policy, process, people, and technology, all of which are necessary for deployment of a successful security process.