Back to Home

Security Policy

Last updated: March 30, 2025

Our Commitment to Security

At Harblot, security is not just a feature—it's a foundational principle. We understand that our clients trust us with their most valuable asset: data. We take this responsibility seriously and have implemented comprehensive security measures to protect your information.

This Security Policy outlines our approach to safeguarding your data and maintaining the integrity of our systems. We employ industry-leading practices and technologies to ensure that your information remains secure, private, and available when you need it.

Zero-Trust Architecture

We implement a zero-trust security model that requires strict verification for anyone trying to access resources in our network, regardless of position or location. Every access request is fully authenticated, authorized, and encrypted before access is granted.

End-to-End Encryption

All data is encrypted both in transit and at rest using industry-standard encryption protocols. This ensures that your information remains protected at all times, whether it's being transferred or stored in our systems.

Continuous Monitoring

Our security operations center provides 24/7 monitoring of all systems and networks. Advanced threat detection tools identify and respond to potential security incidents in real-time, minimizing risk exposure.

Secure Infrastructure

Our infrastructure is built on secure cloud platforms with multiple layers of security controls. We implement defense-in-depth strategies that provide redundant security measures to protect against various attack vectors.

Compliance & Certifications

Harblot maintains compliance with industry standards and regulations to ensure the highest level of security for our clients.

SOC 2 Type II

We undergo regular SOC 2 Type II audits to verify our security, availability, and confidentiality controls.

ISO 27001

Our information security management system is certified to ISO 27001 standards.

GDPR Compliance

We adhere to GDPR requirements for processing and protecting personal data.

HIPAA Compliance

For healthcare clients, we maintain HIPAA compliance for handling protected health information.

Security Practices

Access Control

We implement strict access controls based on the principle of least privilege. This means that employees are only granted access to the specific data and systems they need to perform their job functions.

  • Multi-factor authentication is required for all access to systems containing client data
  • Regular access reviews ensure that permissions remain appropriate
  • Automated provisioning and de-provisioning processes for employee onboarding and offboarding

Data Protection

We employ multiple layers of data protection to safeguard your information:

  • Data classification to ensure appropriate handling of sensitive information
  • Data loss prevention tools to prevent unauthorized data exfiltration
  • Regular data backup and disaster recovery testing
  • Secure data deletion processes when information is no longer needed

Vulnerability Management

Our vulnerability management program includes:

  • Regular security assessments and penetration testing by independent third parties
  • Continuous vulnerability scanning of our infrastructure and applications
  • Timely patching of identified vulnerabilities
  • Secure development practices and code reviews

Incident Response

Despite our best preventive measures, we maintain a robust incident response plan to address any security events quickly and effectively.

Detection

Advanced monitoring systems identify potential security incidents in real-time.

Response

Our dedicated security team responds immediately to contain and mitigate any identified threats.

Communication

We provide timely notifications to affected clients in accordance with regulatory requirements.

Have Security Questions?

Our security team is available to address any questions or concerns about our security practices.

Contact us at: security@harblot.com