Security on Pulse Market: Our Commitment

Pulse Market is an Irish SaaS provider of cloud-based software solutions, known for its innovation and commitment to due diligence excellence.

Overview

Pulse Market is an Irish SaaS provider of cloud-based software solutions, known for its innovation and commitment to due diligence excellence.

Security on Pulse Market: Our Commitment

At Pulse, security is paramount. Built on Microsoft Azure’s secure platform, we use strong encryption and strict access controls to guarantee data is secure and available for business operations.

Pulse features the following key attributes:

  • Cloud-Based Accessibility: remote accessibility for efficient and flexible business operations across geographic locations
  • Intuitive User Interface: an intuitively designed UX interface ensures ease of use, even for users with limited technical proficiency.
  • Streamlined Procurement and Due Diligence:
    Replaces cumbersome spreadsheets and email exchanges, eliminating the risk of data loss in multiple systems and desktops
  • Security: Designed and securely built on Microsoft Azure secure platform employing strong encryption and access controls.
  • Automated notifications: eliminate manual follow-ups, ensuring timely responses, enhancing efficiency, and fostering stronger contractor relationships with up-to-date information.
  • Tailored Customisation: the system is adaptable to organisations requirements and workflows, enhancing overall efficiency and productivity.
  • Comprehensive Analytics: The system will facilitate the generation of data insights to support informed decision-making.

 

Enhancing Security Layer by Layer

We integrate security into every layer of our operations building on a foundation of robust data protection measures. Our security strategy is aligned to the ISO 27001 Information Security Management System (ISMS). It is a comprehensive ISMS framework of policies and controls that includes all legal, operational and technical controls involved in an organisation’s information risk management processes and incorporates the following components:

  • Organisational security
  • Cloud security
  • Infrastructure security
  • Data security
  • Identity and access control
  • Operational security
  • Incident management
  • Resilience
  • Vendor management
  • GDPR compliance

Your Peace of Mind is Our Priority

Your information assets are always protected on Pulse Market with scheduled data backups, secure data upload process and encrypted data storage.

A Comprehensive Approach to Information Security

With a dedicated Chief Security Officer and expert developers’ team, Pulse is developed and located in the Microsoft Azure environment taking advantage of Microsoft’s strong security capabilities and secure by design principles.

With Pulse Market, your company and third-party information is in safe and secure hands.

Information Security

Our Information Security Management System (ISMS) takes into account our security objectives and the risks and mitigations concerning all the interested parties. We employ strict policies and procedures encompassing the security, availability, processing, integrity, and confidentiality of customer data. Our security strategy is aligned to the ISO 27001 Information Security Management System (ISMS).

Organisational security 
We have a dedicated Chief Information Security Officer (CISO) and an experienced software development team building the Pulse Market platform on the Microsoft Azure environment taking advantage of Microsoft’s strong security capabilities and secure by design principles.

We are progressing to ISO27001 certification.

Backup

A combination of full, differential and cumulative backups are used to ensure data integrity and timely restoration. Backup integrity procedures are in place and all backups are encrypted. Data is stored for redundancy on multiple devices. Integrity checking using checksums and preventative maintenance procedures ensure backup quality.

Backup of production environment includes backup of the online database, offline data and source code and production environment network configuration data.

The online database is backed up by snapshots every 48 hours and the source code is backed up at least once a day. Backup data recovery tests are conducted under the annual backup recovery test plan once a year.

Multi-Factor Authentication

We require multi-factor authentication to access secure systems and data. It provides an extra layer of security by demanding additional verification that the user must possess, in addition to the password. This can greatly reduce the risk of unauthorised access if a user’s password is compromised.

Administrative access

Access to production environments is strictly controlled and is maintained by a central directory and authenticated using a combination of strong passwords and two-factor authentication. We also log all the operations and audit them periodically.

We adhere to the principles of least privilege and role-based permissions to minimize the risk of data exposure.

 

Encryption

In transit

All customer data transmitted to our servers over public networks is protected using strong encryption protocols. We mandate all connections to our servers use Transport Layer Security (TLS 1.2 and above) encryption with strong ciphers, including web access, API access, and mobile apps. We also use HTTPS for communications from our front end to back-end servers with secure link services.

At rest

Customer data at rest is encrypted using 256-bit (AES). Our data is encrypted using Advanced Encryption Standard 256-bit (AES-256), RSA-1024 and above and MD5 hashing algorithm.

 

Vulnerability management

We have a dedicated vulnerability management process that actively scans for security threats using a combination of Microsoft security tools and third-party scanning tools. Once we identify a vulnerability requiring remediation, it is logged, prioritized according to the severity, and assigned to an owner. We further identify the associated risks and track the vulnerability until it is closed by either patching the vulnerable systems or applying relevant controls.