TekVision Technologies Inc. logoTekVision Technologies Inc.

TekVision Technologies Inc. Trust Center

TekVision Technologies Inc. is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.

Compliance

Resources

SOC 2 Type I Report
Vendor Management Policy
Information Technology Leadership Committee Charter
Access Control and Termination Policy
Board of Directors Charter

Controls

Source code access restricted and changes logged
Access control procedures
Multi-factor authentication enforced for production access
Quarterly user access reviews performed
Termination Access Revocation Checklist
Data encrypted at rest
Customer data deleted after termination
Backup and recovery policy
Outsourced development security requirements managed
Source code changes tested and approved
Secure connection means utilized
Web application firewalls configuration
External Attack Surface Vulnerability Scanning & Remediation
Anti-malware monitoring
Intrusion detection tool
Infrastructure firewall
Monitoring tool
Centralized Log Collection and Monitoring
Business continuity & disaster recovery plans documented and tested
Security incident logging and review
Breach notification communication
Visitor sign-in, badging, and escort policy
Technology assets inventoried
Documented Vendor Management Program
Vendor termination
Vendor list
Vendor onboarding
Confidentiality Agreement acknowledged by employees
Employee handbook
List of active employees & contractors as on date
List of newly hired employees & contractors
Security awareness training implemented
Whisteblower mechanism maintained
Multi-availability zones
Documentation available to internal and external users
Customer support channels available
Asset register maintaining
Risk and Governance Executive Committee meeting minutes
Risk management program
Information security policies and procedures
Patch management process developed
Production system hardening and baseline configuration management
Reported security concerns addressed and resolved
Organization chart

Subprocessors

AWS
AWSCloud Infrastructure & Platform Services
GitHub
GitHubCode & Build Security
Twilio
TwilioBusiness Apps & Productivity
Cloudflare
CloudflareNetwork & Edge Security