TELEMESSAGE KEEPS YOU SECURE

TeleMessage makes sure your data is protected the moment you join us.

A Fortified Infrastructure

Enterprise mobile security isn’t just about sending secure messages, but making sure that data is protected from end-to-end and ensure service availability at all times. That’s why we’ve implemented the following processes and safeguards:

Hardware

TeleMessage uses its own private cloud platform.

Information is stored in SSAE-16 SOC2 certified hosting facilities.

VMWare infrastructure to ensure high service availability across multiple hardware platforms.

Software

Secure design with separation of user access and data storage.

Checkpoint Firewalls for site protection, deep protocol inspection, DDoS protection, IPS and more.

F5 LTM and ASM (Load Balance and Application Firewall) for content filtering, DDoS and Web Application Firewall.

HTML Encoding and Anti-Script Injections: to prevent users from sending messages or pages that generate activities on subscriber PC’s. All severs implement HTML Encoding and Anti-Script injections.

Systems hardening procedures and policies.

Secure Client-Server Communication: communication between client and server is locked by encrypted protocol using TLS.

IP tracking: the system logs access attempts and record IP address where they originate from. Client can configure to allow access from certain IP address ranges.

Message Limitation: allows us to set the number of maximum messages per period (day/month), and maximum recipients per message.

Fraud Detection: the system detects repeated failed access of password hacking and automatically locks the suspected accounts. The original account user will receive a notification about the attempt and will have to change password or contact support to release account lock.

NOC Monitoring

Our 24×7 NOC team uses various monitoring systems to ensure service availability and security including: server performance thresholds to provide high SLA at all times and log managers to analyze application behavior and provide ability to predict failure or service degradation ahead of time.

Verified & Certified

TeleMessage successfully passed the information security audit by DELOITTE, they’ve assessed our security policies and procedures, including corporate physical security, information security within our systems, system protections such as firewalls and password protection, business continuity and business interruption plans. Furthermore, we’ve been consulted by APPSEC during the development stage to minimize security threats and ensure application integrity.

 TeleMessage is an ISO Certified Vendor

Picture1

Picture2

Picture3

Picture4

Policies & Protocols

It’s clear that organizations that have good security habits share certain traits that are lacking in organizations that don’t do information security well. What are these good security habits and how can you learn more? We’ve compiled a list of the 10 Best Practices of Enterprise Security based on our own security policies and procedures implemented to safeguard sensitive customer information. These practices address dimensions of information security such as policy, process, people, and technology, all of which are necessary for deployment of a successful security process.

Download

Our Enterprise Security Handbook