Trust

Lattice knows that the confidentiality, integrity and availability of data are serious concerns for our customers. Lattice has implemented a state-of-the-art security architecture with tools at all layers of our infrastructure designed to constantly monitor network and application traffic. Lattice is continually working to improve its security framework. Below is a high-level description of the administrative, physical and technical safeguards that we have put in place. We will continue to implement these practices over time for the protection, security, confidentiality and integrity of data processed by use of our applications.

   TRUSTe European Safe Harbor certification                  


Secure Transmission and Sessions

  • Connection to salesPRISM is via SSL 3.0/TLS 1.0, DigiCert’s High Assurance EV Root CA and the DigiCert High Assurance CA-3
  • Individual user sessions are identified and re-verified with each transaction, using a unique token created at login

Network

  • Perimeter firewalls and edge routers block malicious traffic
  • Multi-tiered internal network with firewalls to segregate traffic between the application and database tiers
  • A monitored intrusion prevention systems prevents attacks and reports events to a security information and event management system for logging, alerting, and response
  • A third-party service provider continuously scans the network and application and alerts changes in baseline configuration

Data Centers


Our service is deployed at SSAE 16 certified tier one data centers. These facilities provide:

  • Biometric scanning for access
  • Dedicated concrete-walled Data Center rooms
  • Computing equipment in access-controlled steel cages
  • Video surveillance throughout facility and perimeter
  • Building engineered for local seismic, storm, and flood risks
  • State of the art HVAC
  • Underground utility power feed
  • Redundant (N+1) CPS/UPS systems
  • Redundant power distribution units (PDUs)
  • Redundant (N+1) diesel generators with on-site diesel fuel storage
  • Concrete vaults for underground cable runs
  • Redundant internal networks
  • Network neutral; connects to all major carriers and located near major Internet hubs
  • High bandwidth networks
  • VESDA (very early smoke detection apparatus)
  • Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression

Backups

  • All data are backed up to disk at each data center, on a rotating schedule of incremental and full backups
  • All backups are encrypted with AES 256
  • The backups are cloned over links to a tape archive
  • Tapes are transported offsite and permanently destroyed when retired

Internal and Third-Party Testing and Assessments


Lattice tests its application code for security vulnerabilities before release, and regularly scans our network and systems for vulnerabilities. Third-party assessments are also conducted periodically:

  • Application vulnerability assessments
  • Network vulnerability assessments
  • Penetration testing
  • Code review
  • Security control framework review and testing

Security Monitoring

Our Information Security team monitors notifications from various sources and alerts from internal systems to identify and manage risks.

Reliability

To facilitate maximum uptime and continuous availability, we have employed industry standard best practices for system design and management practices. Our solution is fault tolerant and highly scalable.

 

Privacy Policy