Enterprise-Class Data Security for Ediscovery
Data security is at the heart of everything we do. We achieve security excellence through active collaboration, clear expectations, responsiveness, and organizational awareness.
Protecting Your Data
Zapproved logs and monitors all access to our applications and cloud environments to ensure your data is always secure. Our security industry leading practices include:
- Data backed up regularly to minimize potential downtown
- Data encrypted-at-rest using AES 256
- Encrypted-in-transit over public networks using TLS 1.2
Securing Our Environments
Our security is your security. Zapproved hosts its applications in US-based data centers, and our network architecture follows clearly delineated production and development networks.
- US-based AWS data centers compliant with a wide range of compliance standards
- Segmented network architecture
- Ongoing alerting and monitoring by on-call engineers and security analysts
Continual Testing
Our applications and environments undergo substantial security testing to keep your data safe. Zapproved security analysts conduct monthly vulnerability scanning on servers using best-in-class scanners.
- Monthly server vulnerability scanning
- Static Analysis Security Testing and annual third party gray box penetration test
- Security, financial, and legal reviews of third party software, applications, and contractors.
Security Gold Standard Compliance
Zapproved has established controls to comply with the gold standard in SaaS audit standards. Our AICPA SOC 2 Type 2 audit is performed annually by a leading national audit firm. Our controls are mapped and tested against AICPA security, confidentiality, and privacy principles.
- Annual SOC II Type 2 Audit
- GDPR and CCPA compliant
Frustrated by Out-of-Control Ediscovery Costs?
Schedule a free ROI Analysis to learn how much money and time you can save with ZDiscovery.
Additional Reading
A How-To Guide For Managing Discoverable Data
The quality of your ediscovery can never exceed the quality of your information governance. Here’s how to make the most of both.
How to Conduct a Data Security Audit
The quality of your ediscovery can never exceed the quality of your information governance. Here’s how to make the most of both.