Protecting intellectual property is at the heart of what we do — and it starts with how we handle your data.

Our team has implemented robust security policies and controls, and proves our compliance with those controls through third-party audits.

Your IP is Safe With Us

Information Security Program

We are actively working towards achieving SOC 2 Type II and ISO 27001 compliance.

As a SOC 2 Type I compliant service provider, Lightbringer has implemented controls that ensure the secure management of your organization's data, safeguarding both its interests and privacy.

SOC 2 sets benchmarks for handling customer data based on trust service principles, and here's how we fulfill those criteria:

Security

We safeguard our system and your data against unauthorized access through the implementation of advanced, industry-leading security measures.

This includes the deployment of comprehensive encryption protocols, multi-factor authentication (MFA) processes, and continuous network monitoring to ensure the highest levels of data integrity and confidentiality.

Additionally, we are committed to maintaining comprehensive security training for all of our staff.

Availability

Our infrastructure is designed with redundancy and resilience in mind, incorporating failover mechanisms and scalable resources to maintain service performance under varying loads.

We employ proactive monitoring and incident management strategies to quickly identify and resolve potential disruptions, minimizing downtime. Regular testing of our disaster recovery and business continuity plans ensures our preparedness to swiftly restore services in the event of an unforeseen incident.

Confidentiality

Access to confidential data is strictly limited to authorized personnel through the use of role-based access controls and secure authentication mechanisms.

We enforce comprehensive data privacy policies and conduct regular training for our employees on confidentiality best practices. Our commitment to protecting your information is further reinforced by rigorous audits and assessments to prevent unauthorized access and ensure the privacy and security of your data at all times.

Processing Integrity

We implement validation checks, quality assurance processes, and error detection and correction mechanisms throughout the data lifecycle.

We utilize automated monitoring systems to track and report on the processing activities, enabling us to identify and rectify any discrepancies promptly.

Additionally, our transparent logging and auditing procedures allow for a thorough review of data processing activities, ensuring that all operations are conducted accurately and effectively.

data protection

Data at rest

We securely encrypt all customer data using AES encryption before storing it in data centers managed by leading cloud service providers.

Additionally, we perform daily backups to ensure data redundancy and protection against loss.

DATA IN TRANSIT

We ensure the security of data in transit by utilizing TLS 1.2 or higher encryption, guaranteeing that all transmitted information is protected.

Furthermore, we safeguard all endpoints, making certain that they are secured against unauthorized access and vulnerabilities.

DATA ACCESS CONTROL

We adhere to the principle of least privilege and implement role-based access control to minimize potential attack surfaces.

This approach ensures that each user is granted the minimum level of access necessary to perform their duties, significantly reducing the risk of unauthorized data exposure.