Security Privacy

Wise Systems utilizes enterprise-grade best practices to protect our customers.

Security Commitment

At Wise Systems, customer trust is our #1 priority.

We maintain the highest standards of data privacy and security because we know your data is important to keep secure. Wise Systems undergoes regular testing and security reviews, designed to be SOC 2 compliant.‍

Our customers entrust their operational data to our care. Keeping it secure is our promise.

Secure and Reliable Infrastructure

Wise Systems uses Amazon Web Services (AWS) to host our applications. AWS data centers are monitored by 24×7 security, biometric scanning, video surveillance and are SOC 1, SOC 2, and SOC 3 certified.

World-Class Application Security

  • Data Encryption
    Data is encrypted in-transit using TLS 1.2. Data is encrypted at-rest using 256-bit encryption via native AWS capabilities.
  • SSO
    Single Sign-on (SSO) allows you to authenticate users in your own systems without requiring them to enter additional login credentials.
  • Data Permissions & Authentication
    Access to customer data is limited to authorized employees who require it for their job and data access is logged.
  • Incident Response
    Security breaches will be communicated within 48 hours, and vulnerabilities are fixed ASAP.
    Enterprise-Ready Compliance

SOC 2

Wise Systems is SOC 2 compliant. An independent auditor confirmed that Wise Systems meets the requirements set forth in TSP section 100, 2017 Trust Services Criteria for Security and Availability.

The SOC 2 audit is one the highest recognized standards of information security compliance in the world. It was developed by the American Institute of CPAs (AICPA) to allow a third-party auditor to validate a service company’s internal controls with respect to information security. The SOC 2 Audited Report is the auditor’s opinion on how an organization’s security controls meet the SOC 2 criteria.

To obtain our audited SOC 2 Report, a third-party auditor reviewed our internal controls including policies, procedures and infrastructure regarding data security, firewall configurations, change management, logical access, backup and disaster recovery, security incident response and other critical areas of our business.

The use of our SOC 2 report is restricted. For inquiries, please contact sales@WiseSystems.com.

Ongoing Commitment to Security

  • Penetration Tests
    Wise Systems works with industry leading security firms to perform annual network and application layer penetration tests.
  • Employee Trainings
    At Wise Systems, security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.
  • Secure Software Development
    Wise Systems employs a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

FAQ

  • Where’s the data being stored?
    Customer data is generally stores in the country that our customer resides in unless otherwise indicated. We use Standard Contractual Clauses (SCC) to cover regulatory requirements for European customers.
  • What else do you do to keep customer data secure?
    Wise Systems employs a variety of technical and organizational controls to keep customer data secure. All our employees sign a Non-Disclosure and Confidentiality Agreement when joining the company to protect our customers’ sensitive information.
  • How often is the data backed up?
    All data is backed up at least daily.
  • Wise Systems works with all modern browsers without any plugins.
    Wise Systems works with all modern browsers without any plugins.

Thank you for helping to keep Wise Systems and our users safe!

Report a privacy or security issue.

We may revise these guidelines from time to time.

Reviewed on: June 16, 2023

Like what you see? Sign up for our newsletter.