Ensuring Data Security with Perenso

September 20, 2024

Guest Writer: Garret Olds

Perenso understands the critical importance of data security for B2B companies. We implement industry-leading security measures to safeguard your data at every turn.

With over 5 years of experience, Garret Olds, our systems and platform engineer, unveils the depth of Perenso's security measures.

Confidentiality: Keeping Your Data Secret – Perenso's Commitment

  • Role-Based Access Control (RBAC)

    Perenso utilises role-based access to define specific user roles and assign permissions accordingly for Perenso staff and our users. This ensures that only users with legitimate business needs can access specific data sets. 

  • Data Encryption

    Perenso utilises industry-standard encryption algorithms to scramble your data both at rest (stored in databases) and in transit (traveling across networks). All web traffic is automatically redirected to ensure TLS (HTTPS) encryption is always used. 

Integrity: Ensuring Your Data Accuracy – Perenso's Safeguards

  • Segregated Databases

    Perenso maintains separate databases for each client. This isolation prevents unauthorized access from one client to another's data and eliminates the risk of accidental mixing during operations. 

  • Segregated Network Environments

    Perenso applications and software are deployed on separate secure networks. This segmentation restricts unauthorized access across platforms and provides a demarcation for our production, testing and development environments. 

  • Apps Protected by Web Application Firewall (WAF)

    Perenso protects all applications accessible from the web with an application firewall. This advanced filter restricts access to the minimum required for the application and constantly monitors incoming traffic to help prevent any malicious or unauthorised activity. 

Availability: Keeping Your Data Accessible – Perenso's Uptime

  • Infrastructure Hosted in Microsoft Azure

    Perenso leverages the robust security features of Microsoft Azure, a trusted cloud platform known for its world-class redundancy and disaster recovery capabilities. Microsoft Azure employs geographically distributed data centers, ensuring your data remains available even during localised outages. 

  • On-Demand Scalability

    Perenso's cloud-based applications are set to scale to our customer’s requirements. As your data storage or processing needs grow, Perenso can seamlessly scale up resources to accommodate the increased demand. This eliminates infrastructure limitations and ensures smooth operation even during periods of high activity.   

  • Data Redundancy Across Regions

    Perenso understands the importance of data backups stored in geographically separate locations. This redundancy ensures that even in the event of a natural disaster affecting one region, your data remains secure and accessible from another geographically isolated backup.  

Organization: Proactive Security Measures – Perenso's Vigilance

  • Regular Vulnerability Assessments

    Perenso prioritises continuous security by conducting regular vulnerability assessments. We employ both Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). SAST analyses the application code to identify potential vulnerabilities within the software itself. DAST simulates real-world attacks to uncover weaknesses that might be exploited by malicious actors. 

  • Least Privilege & Zero Trust Observed

    Perenso adheres to the "least privilege" principle, granting users only the minimum access level required for their specific job functions. This minimises the potential damage if a security breach occurs. Additionally, Perenso adopts a "zero trust" security model, where no user or device is inherently trusted. This continuous verification ensures that only authorised users can access your data, regardless of their location or device. All access is reviewed regularly to ensure that this is maintained. Multi-factor authentication (MFA) is enforced for all Perenso staff at all times. 

  • InfoSec Policies & Procedures

    Perenso maintains information and security policies and procedures as an ongoing compliance effort to meet industry standards. The goal is to ensure the safe operation of all our applications for our customers. All of the Perenso team must adhere to these policies and procedures which are reviewed at a minimum annually. 

Perenso: Your Trusted Security Partner

In today's data-driven world, robust security practices are no longer optional – they're essential for B2B software solutions. Perenso empowers informed decisions by providing transparency into our security protocols. We are committed to ongoing security assessments, continuous improvement, and building trust with our clients.

Ready to learn more about how Perenso can empower your B2B operations with secure, reliable software? Contact us today!