Skip to content

Information Security

Enterprise-grade security for your data wherever it resides

Information Security@2x

Cloud Security

We maintain our cloud security posture aligned with industry security standards and best practices to ensure that we follow the best to stay protected. Have a look at our groundwork on cloud security:

Interaction

Data Segregation

All the application and database servers are hosted in a private subnet and are not exposed to the internet. In other words, there will be no public IP to these machines. The application and database server will be hosted in a separate subnet ensuring the highest level of security measures are in place.

 

Troubleshooting

Security by Design

42Gears services are hosted on trusted platforms such as Amazon Web Services (AWS), Google Cloud Platform (GCP), and MongoDB Atlas. These data centers are equipped with an array of robust security features, including security guards, fencing, security feeds, and advanced intrusion detection technology.

Data Encryption

Data Encryption

We employ a minimum of 128-bit symmetric encryption and a 1024-bit authenticated key agreement to ensure the confidentiality and integrity of your data. Additionally, we have implemented the HTTP Strict Transport Security (HSTS) header across all our web connections. This further strengthens the security of your data by enforcing secure communication protocols and preventing certain types of attacks.

Recovery and Backup

Data Retention, Recovery and Backup

To safeguard data and configurations of all our applications, we have implemented a robust data retention, recovery, and backup system. Regular backups are consistently created to ensure the safety and availability of your data. These database backups are generated at scheduled intervals and securely uploaded to an AWS bucket. This guarantees that your data is protected and readily recoverable in the event of any unforeseen circumstances.

 

Infrastructure security

Infrastructure Security

42Gears Cloud relies on the robust security framework provided by Amazon Web Services (AWS) and adheres to the AWS Shared Responsibility Model. For detailed information, please refer to the AWS Shared Responsibility Model. Within the 42Gears cloud infrastructure, data is meticulously segregated on multiple layers to maintain logical separation.

Product Security

Here at 42Gears, we have a dedicated product security team to test and resolve product security issues. Our engineering team obeys a secure software development lifecycle policy. Our product security focuses on the security of data processed by, or in relation to our products. Security is embedded in all aspects of our innovation, products, systems, and services.

Secure Development

Secure Development

From being a concept to the production and amid, we prioritize security throughout the entire product development lifecycle.

Security Resources

Security Resources

We recommend all connections to the servers using SSL/Transport Layer Security (TLS 1.2) encryption with strong ciphers for all connections including web access, API access, and mobile apps.

Security Scan

Annual Testing & Security Scan

We conduct regular Vulnerability Assessment and Penetration Testing, following the OWASP (Open Web Application Security Project) Standards. A reputable cyber security company in India performs our external pentest. Furthermore, we engage third-party vendors to assess our applications annually.

Security Team

Product Security Team

Our Product Security team comprises highly skilled professionals whose primary objective is to identify and mitigate potential vulnerabilities and threats throughout the product's lifecycle.

 

Security-Advisories

Security Advisories

42Gears is focused on ensuring the security of our products. We are committed to rapidly addressing issues as they arise, and providing recommendations through security advisories and security notices. Security advisories are fixes or workarounds for vulnerabilities identified with 42Gears products. Click here for detailed information on security advisories.

Icons-for-Trust-center

Deprecations and Removals

42Gears does not market, sell, deploy, or provide updates to versions of products that have reached the end of life (EOL).  Although the product works, old versions of software inherently have security vulnerabilities that attackers can exploit. Your best defense is to be on software that can receive updates and is free of known vulnerabilities. Click here for detailed information on the dates and/or versions by which 42Gears capabilities have already or will, within the next few months, reach their EOL.

Organisational Security

At 42Gears, every employee is actively engaged in our security culture. We promote a security-conscious mindset throughout the organization through ongoing training and awareness programs. This ensures that our team members understand their roles and responsibilities in maintaining a secure environment and protecting sensitive data.

Employee Background check

Employee Background Checks

With the utmost priority placed on the security and well-being of our organization, we have established a robust policy mandating employee background verification. This policy serves as a crucial safeguard, enabling us to thoroughly assess the backgrounds of all employees. By implementing this mandatory procedure, we are committed to ensuring a secure and trustworthy work environment, instilling confidence among our stakeholders and protecting the interests of our organization.

 

Security Awareness

Security Awareness

We consistently provide essential Information Security awareness training throughout the organization at regular intervals. In addition, we assess their knowledge through tests and quizzes to identify areas where further training is needed. To promote awareness and foster innovation in security and privacy, we also organise internal events.

Internal Audits and check

Internal Audits and Checks

To proactively identify and mitigate potential threats, we conduct weekly audits on malware reports. These audits involve a comprehensive examination of potential malware and security vulnerabilities, allowing us to promptly address any emerging risks.

In addition to the weekly audits we perform internal security audits on a defined frequency on our servers. These audits ensure that our servers adhere to the highest security standards and that all necessary security measures are in place to protect sensitive data and prevent unauthorized access.

Network Security

Our Network architecture ensures that sensitive data is protected through best business practice security policies and procedures. This includes hardened Firewall configuration rules, network logical segmentation, proactive monitoring, active vulnerability assessments, load balancing, digital certificates, etc.

Our network security and monitoring measures are strategically crafted to deliver robust layers of protection and defence. By employing firewalls, we effectively thwart unauthorised access and undesired traffic from compromising our network. Additionally, we fortify our systems by implementing network segmentation, which acts as a safeguard to shield sensitive data from potential threats.

Physical & Infrastructure Security

We have active and passive security control measures in place to protect employees, technology, information, and infrastructure against unauthorized access, sabotage, damage, and criminal activity.

We ensure stringent control over access to our resources, including buildings, infrastructure, and facilities. To achieve this, we employ access cards that regulate consumption, entry, and utilisation. Different access cards are assigned to employees, contractors, vendors, and visitors, restricting their access solely to the purpose of their presence on the premises.

Data Security

We enforce strong data protection standards to guarantee appropriate data handling at all classification levels, from processing and storage to transfer and destruction. We ensure that the appropriate encryption controls are in place for data at rest in the cloud.

Our Software Development Life Cycle (SDLC) serves as a guiding framework, enforcing adherence to secure coding guidelines. Moreover, we employ a range of robust measures to screen code changes for potential security vulnerabilities. These measures include utilising code analyser tools, vulnerability scanners, and conducting thorough manual reviews to ensure the utmost security.

Secure Client Installation on Mobile Devices

Common app marketplaces, such as Windows Store, Apple App Store, and Google Play Store have their own security processes and models to ensure secure client installation on mobile devices. 42Gears follows the rules each store has set up for publishing SureMDM agent application, Nix.

Secure Client Communication

42Gears uses Secure Sockets Layer (SSL) to secure communication between endpoints and the MDM server. The endpoints include mobile devices based on platforms such as Android, iOS and Windows. 42Gears SureMDM communicates with iOS devices using the Apple Push Notification Service (APNs). SureMDM uses a certificate to communicate to the Apple MDM services, which the admin must download from the Apple Push Certificates Portal. For Android devices, 42Gears uses Google Cloud Messaging, and for Windows devices, 42Gears uses Windows Push Notification Services (WNS).

Identity and Authentication

  • Device Enrollment Authentication
    42Gears SureMDM can integrate with any OAuth endpoint for this authentication. This allows 42Gears to use identity services like ADFS, Azure AD, G Suite, and Microsoft 365 for device enrollment.

  • Portal Login Authentication
    By default, 42Gears SureMDM offers its own indigenous user management. But it can also integrate with any SAML2-based identity service to offer seamless Single Sign-On. Azure AD, Okta, and OneLogin are a few such identity services.

  • Two-Factor Authentication
    SureMDM can protect admin accounts from password theft by enabling two-factor authentication for owners and co-account owners through Google Authenticator, email, and/or phone numbers. Once two-factor authentication is enabled, IT admins will be required to provide an additional form of identity proof while logging in, such as a time-sensitive one-time password (OTP).

Payment

Payment Gateways
We work with a few commercial payment gateways, such as Stripe, PayPal, and Chargify. Once customers select a payment gateway, they are transferred to systems that are controlled by these service providers to complete the payment. Such payment gateways render payment services as data controllers and comply with all necessary obligations required for processing data under applicable data protection laws and their respective Privacy Notices. We do not store or collect your payment card details in any manner whatsoever.

The payment processors we work with are

 

Business Continuity & Disaster Recovery

42Gears uses a high-availability architecture to ensure that, in the event of a failure, service performance continues to meet client expectations. We are compliant in maintaining ISO 27001:2022 & SOC 2 Type II, which requires the production, maintenance, and testing of a Disaster Recovery Plan (DRP).