• Technologies

Borealis technology

All hardware, network, and web applications are managed, constantly monitored, and regularly audited by Borealis and our designated Infrastructure-as-a-Service (IAAS) provider (OVH and AWS, two world-class cloud providers).

Infrastructure, network, and application protection

Hardened hosted infrastructure

  • All production services are hosted at a Tier 3 certified design data center that is:
    • ISO 27001:2005 certified;
    • SOC 1 Type II (SSAE 16 and ISAE 3402) and;
    • SOC 2 Type II compliant
  • High availability servers with automatic failover capabilities
  • Changes are monitored and reviewed for legitimacy and security patches are kept up to date
  • Timely response to security incidents

Vulnerability Management

  • Protected by enterprise grade firewalls, Intrusion Prevention & Detection System (IPS/IDS) and Protected against DoS/DDoS attacks
  • Third-party vulnerability testing and support provides an additional level of security (Third party intrusion tests and Qualys reports are available upon request)
  • Web application scanning system automatically identifies OWASP Top 10 risks
  • Ongoing 24/7 monitoring of technical systems and infrastructure by Boréalis operations and support team

Business continuity and disaster recovery

Count on us to keep your application up and running.

Business continuity

  • Scalable, distributed computing infrastructure provides essential redundancy
  • Offsite mirroring of data and application
  • Complete virtual server backups made on a daily basis
  • Hot-site disaster recovery tests performed daily;complete disaster recovery diagnostic done quarterly.

Operational policies and processes

Business practices that are in line with the highest industry standards.

Operational policies

  • Risk assessments conducted regularly
  • All employees, partners and vendors required to sign and adhere to confidentiality agreements
  • All client info treated as confidential and access is granted on a need-to-know basis
  • Access enforced with policies to control all activities including user registration, access privileges and passwords
  • Security-qualified and authorized Boréalis employees access the system using 2-factor authentication
  • User host access, authentication level and login times are monitored and documented

Architecture, identity and access management

Count on us to keep your application up and running.

Administration controls

  • Only application administrators are allowed to create users and assign data security rules
  • All access is governed by strict password security policies with configurable complexity
  • Access controls can be assigned by project, campaign, communication, group or role
  • Document-level security ensures everyone has all the information they need while keeping sensitive data safe

Architecture

  • Multi-tenant architecture allows all business units to share one installation and enables multiple configurations – corporate wide, site, partner, contractor, teams, etc.
  • Multi-instances allow each business unit to further configure each instance for a different environment
  • Data segregation within an instance with row-level access permissions enables complex user access configurations

Data Encryption

  • All data transmissions and data at rest are fully encrypted using SSL and 256-bit AES technology
  • Individual user sessions identified and re-verified at each transaction, with a unique token created at login

User access

  • Supports several authentication protocols, including SAML single login and single logout and LDAP

Activity log

  • All activities performed within the application are logged with Audit Trail
  • All data exports are recorded as an activity with the date and user

Privacy

  • Complies with General Data Protection Regulation (GDPR), including user consent, data retention, access and deletion.

Our technology complies with the highest industry standards for enterprise security to ensure the confidentiality, integrity, and availability of your information.