Pro5 runs on highly secure, scalable infrastructure on the cloud. Security is a key feature of our technology stack, from the infrastructure up to the application.
Our proprietary software goes through regular security assessments & config audits.
Our infrastructure undergoes regular penetration testing to ensure that potential vulnerabilities are identified and addressed swiftly.
Please reach out to us for access to our latest Pen Test report.
An external team of security experts perform regular security audits to ensure our users' data remains protected and in compliance with industry standards.
Our comprehensive audit logging across the stack allows for full transparency into all activities on the platform. Please reach out to us for access to our latest Security reports.
The Pro5 Platform offers comprehensive Audit Trails for events and changes that take place across the different layers of the Tech Stack. This allows us to validate all user and system activities, and trace back all changes made within the application.
The Audit Trail includes a detailed description of the action, resource affected, and a timestamp.
RBAC has been implemented throughout the Pro5 platform, including custom roles which can be used to control permissions for Users, User Groups, or Service Accounts.
Please reach out to us for access to our Roles and Permissions Matrix.
The Pro5 platform is hosted on a dedicated server environment, providing enhanced security, performance, and control compared to shared hosting.
Our dedicated infrastructure isolates your data and workloads from other environments, ensuring heightened privacy and reduced security risks. Our infrastructure is designed with RAS (Reliability, Availability, Scalability) as a key focus of the platform. This setup ensures that the Pro5 platform remains resilient with minimal downtime, even under high load or during routine maintenance.
Please reach out to us for access to our BCDR (Business Continuity & Disaster Recovery) plan.
The Pro5 platform integrates only with highly reputable 3rd party repositories and providers. We call connections to cloud platforms "Cloud Providers" and connections to other platforms "Connectors".
Please reach out to us for a full list of Connectors.
Our Secure Software Development Life Cycle (SSDLC) integrates security practices into each stage of the development process, including the requirements, design, implementation, and testing.
Please reach out to us for an overview of our SDLC process.
Our platform integrates version control systems within the application, providing a clear audit trail of changes and updates to ensure transparency and traceability during the development lifecycle.
Our secure Change Management process ensures that changes occur in a controlled and secure manner, from definitions to execution. The process is continuously monitored and improved, and stakeholders are educated about the importance of security in the change management process.
Please reach out to us for an overview of our Change Management process.
We have clear Security Incident plan in place for identifying, assessing, and responding to incidents. After every incident, we document key takeaways and learnings to help improve the process and prevent similar incidents in the future.
Please reach out to us for an overview of our Incident Management process.