Cyber Security and Taimen

Taimen News
February 13, 2024
No time to read? Click here to view a 30 second video summary!

While all our partners are familiar with the industry leading service we provide, the advanced internal security measures that protect your data are invisible by design.

Our security measures fall into two main categories: Training and Tech Solutions

Training

Cyber Security Training:

All Taimen employees are required to complete regular cyber security training courses through Ninjio.

Spam and Malware:

Our strict manual vetting protocols ensure that harmful programs never even get to try breaking through our security measures. All Taimen employees are well informed on different forms of phishing and malware distribution, and our tech team regularly identifies new methods of data theft to inform them of.

Two-Factor Authentication and Password Randomization:

All Taimen employees are required to use randomized passwords and Microsoft Authenticator App on corporate devices and phones.

Technology Solutions

24/7 EDR and Endpoint Defenses:

Taimen utilizes enterprise level EDR, or Endpoint Detection and Response. Rather than relying on keeping only our internal network safe, EDR allows our tech team to protect each registered device individually regardless of location. Working from the office or home? The airport? A café? No matter where our team members are, EDR perimeters keep their devices (and your data) safe and sound.

Soft and Hard Firewalls:

Our servers are protected by both soft and hard firewalls. You're probably familiar with soft firewalls; programs like Windows Defender are installed on individual devices to scan the files accessed and downloaded on that device. But, before a piece of malware can reach a soft firewall on one of our devices, it must make it through hard firewalls implemented throughout our servers. These devices preform preliminary scans of all files entering and exiting the Taimen network and catches most harmful data before it can reach a soft firewall.

This double-walled approach to firewall implementation puts Taimen ahead of the industry in enterprise security.

SOC2 Compliance and Data Storage:

Taimen is fully compliant with SOC2 data security standards. In addition, we work hard to minimize the types and amount of customer and corporate data we store so that, in the event of a data breach, very little information will be available to bad actors.

Got Questions?

Contact Us

Quote Request Form

close
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.