Edulog's cloud environments are backed by AWS’ security measures.
Data is encrypted in transit with TLS 1.2. Data is encrypted at rest with AES.
Role based account access workflows.
User access controls with single sign on.
Continuous Security Commitment
Security Awareness Training
Our team members are required to go through employee security awareness training covering industry standard practices and information security topics such as phishing and password management.
Roles and Responsibilities
Roles and responsibilities related to our information security program and the protection of our customer’s data are well defined and documented.
Information Security Program
We have an information security program in place that is communicated throughout the organization. Our information security program follows the criteria set forth by industry standards such as SOC 2.
Continuous Monitoring
We continuously monitor our security and compliance status to ensure there are no lapses.