OptimateIQ follows the zero-trust approach of "never trust, always verify” to enhance the security posture and reduce the attack surface, mitigate risks, and provide better protection against evolving cyber threats. This approach requires continuous verification of identities, strict access controls, and thorough authentication and authorization processes for every interaction within a system.

Least Privilege Approach

OptimateIQ is designed with the principle of the least privilege security concept. We have limited access to data, resources, applications, and application functions to only those a user or entity requires to execute their specific task or workflow.

SSO Integration

OptimateIQ utilizes Single Sign-on (SSO) to help users authenticate securely with enterprise-level credentials and policies. The SSO integration simplifies the authentication process and optimizes the user experience and adheres to the highest security and efficiency standards.

Network Security

OptimateIQ adopts the best practices for network security. All communications between Teams, Web portal, and OptimateIQ's backend are encrypted and accessible via HTTPS using TLS 1.2 / TLS 1.3 with a key length of at least 128 bits for encryption.

Data Security

We extend the principle of the least privilege further to the data we store. OptimateIQ only stores data required for analytics, billing, and troubleshooting bugs & performance issues. We use full-disk encryption within the industry-standard AES-256 encryption algorithm and Azure Key vault for managing cryptographic keys. All the data stored in the database is encrypted using TDE.

Continuous Monitoring

OptimateIQ undergoes regular vulnerability assessments, and penetration tests, conducted by third-party companies, and any vulnerabilities identified in the process are addressed based on their level of risk and severity.

Secure Development

OptimateIQ employs secure programming techniques and protocols in developing applications handling customer data. Also, it provides training for developers in secure development principles.

As part of the DevSecOps process, we regularly perform SAST, DAST & SCA scans to identify & address issues early in the development process.

Scroll to Top