Technical Documentation
search
Ctrlk
WebsiteLinkedIn
  • Technical Documentation
  • Admin Guideschevron-right
    • Epiphany Intelligence Platform Administrator Guidechevron-right
    • Epiphany Validation Engine User's Guidechevron-right
    • Data Usage Guidechevron-right
    • Epiphany Security and Trustchevron-right
      • Introduction
      • Program Details
      • Primary Risks
      • Our Responsibility to You
      • Your Responsibility to Yourself
      • Supplemental Information
      • Secure by Design
      • Conclusion
  • Use Caseschevron-right
  • Epiphany Workflowschevron-right
  • Site Collectorschevron-right
  • Data Sourceschevron-right
  • Data Sources (Early Access)chevron-right
  • Changelogchevron-right
  • Legal Noticechevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Admin Guides

Epiphany Security and Trust

This document is for clients who are either intending to use, or are using Reveald’s Epiphany Intelligence Platform. Its purpose is to help you understand how we protect the data the platform accesses

hashtag
Table of Contents

hashtag
Introduction

hashtag
Program Details

hashtag
Primary Risks

hashtag
Our Responsibility to You

hashtag
Your Responsibility to Yourself

hashtag
Supplemental Information

hashtag
Secure by Design

Data Ingestion, Storage, and Privacy

Network Security and Server Hardening

Endpoint Security

Access Control Provisioning

Authentication

Password Management

System Monitoring, Logging, and Alerting

Data Retention and Disposal

Disaster Recovery and Business Continuity Plan

Responding to Security Incidents

Vendor Management

External Validation

hashtag
Conclusion

PreviousData Privacy and Securitychevron-leftNextIntroductionchevron-right

Last updated 1 year ago

  • Table of Contents
  • Introduction
  • Program Details
  • Primary Risks
  • Our Responsibility to You
  • Your Responsibility to Yourself
  • Supplemental Information
  • Secure by Design
  • Conclusion