1. Security Overview
CapEngage maintains enterprise-grade security standards across our AI-powered automation platform. Security is embedded in our development lifecycle, infrastructure, and operational processes.
Our security program is designed to protect customer data, ensure service availability, and maintain compliance with global security standards.
2. Compliance Certifications
Current Certifications
- SOC 2 Type II: Annual audit covering security, availability, and processing integrity
- ISO 27001: Information Security Management System certification
- GDPR Compliant: Full compliance with EU General Data Protection Regulation
- DPDP Compliant: Compliance with India's Digital Personal Data Protection Act
3. Data Security
3.1 Encryption
All data is encrypted using industry-standard protocols:
- At Rest: AES-256 encryption for databases and storage
- In Transit: TLS 1.3 for all network communications
- Key Management: Hardware Security Module (HSM) for key storage
- End-to-End: Encrypted messaging for sensitive communications
3.2 Data Isolation
Customer data is isolated through:
- Multi-tenant architecture with logical separation
- Dedicated database schemas per customer
- Network segmentation and VPC isolation
- Role-based access controls
3.3 Data Residency
Data centers located in India, EU, US, and Singapore support regional data residency requirements. Customers can specify preferred data storage location.
4. Access Control
4.1 Authentication
Strong authentication mechanisms:
- Multi-factor authentication (MFA) required for all access
- Single Sign-On (SSO) support (SAML, OAuth 2.0)
- Session management and automatic timeout
- Password policies and encryption
4.2 Authorization
Least privilege access model:
- Role-based access control (RBAC)
- Principle of least privilege
- Regular access reviews
- Separation of duties for sensitive operations
4.3 Employee Access
Employee access is strictly controlled through background checks, training, and need-based authorization. All employee access is logged and audited.
5. Infrastructure Security
5.1 Cloud Infrastructure
Hosted on secure cloud platforms:
- AWS, Google Cloud, and Azure infrastructure
- Managed services with shared security model
- Geographic distribution for redundancy
- Disaster recovery capabilities
5.2 Network Security
Network protection measures:
- Web Application Firewall (WAF)
- DDoS protection and mitigation
- Intrusion detection and prevention systems
- Network segmentation and firewalls
5.3 Application Security
Secure development practices including code reviews, static analysis, dependency scanning, and regular penetration testing.
6. Monitoring and Logging
Comprehensive monitoring:
- 24/7 security monitoring and incident response
- Real-time alerting for suspicious activities
- Audit logs for all system activities
- Log retention for 12 months
- Security Information and Event Management (SIEM)
7. Vulnerability Management
Proactive vulnerability management:
- Regular vulnerability scanning and assessment
- Prompt patching of security vulnerabilities
- Bug bounty program for responsible disclosure
- Third-party security audits
8. Incident Response
Incident response process:
- Dedicated incident response team
- 24/7 incident monitoring and escalation
- Breach notification within 72 hours
- Post-incident analysis and remediation
9. Third-Party Security
Third-party risk management:
- Security assessments for all vendors
- Data processing agreements with sub-processors
- Regular vendor security reviews
- Continuous monitoring of third-party dependencies
10. Security Contact
Security Team: security@capengage.com
Report Vulnerability: security@capengage.com
PGP Key: Available on request
Company Information
CAPENGAGE TECHNOLOGY SOLUTIONS PRIVATE LIMITED
Building No 4B, Flat No 304, Olympeo Riverside PH Karjat,
Avasare, Raigad, Maharashtra, India - 410101