DutchTexan is committed to providing a robust, all-in-one platform to manage your sales, marketing, and customer relationships. We recognize the vital role our platform plays in your business operations and are dedicated to ensuring its security and compliance.
Our AI-powered platform offers numerous features essential to your success. We encourage you to leverage the full capabilities of the DutchTexan platform to achieve your business goals.
Our primary security focus is safeguarding your data. We have invested in appropriate controls to protect and service our accounts. This includes implementing dedicated corporate, product, and infrastructure security programs overseen by our Legal Team and other departments.
We have developed our security framework using SaaS industry best practices, with key objectives including:
Account Trust and Protection: Deliver superior products while protecting your data's privacy and confidentiality.
Availability and Continuity of Service: Ensure service availability and minimize continuity risks.
Information and Service Integrity: Ensure your information is never corrupted or altered inappropriately.
Compliance with Standards: Aim to comply with or exceed industry standard best practices.
DutchTexan does not host product systems or data within physical offices. We outsource hosting to leading cloud providers like Google Cloud Platform and Amazon Web Services. Our infrastructure is based in the United States, relying on Google’s and AWS’s audited security and compliance programs.
Google offers a monthly uptime of at least 99.5%. More information on their controls and compliance measures is available on their Compliance Resource Center.
AWS ensures service reliability between 99.95% and 100%, with redundancy in power, network, and HVAC services. Their business continuity and disaster recovery plans are validated in their SOC 2 Type 2 report and ISO 27001 certification. AWS compliance documentation and audit reports are available on their Cloud Compliance Page and Artifacts Portal.
DutchTexan enforces multilayer filtering and inspection on all connections across our web application. Network access control lists prevent unauthorized access. Firewalls are configured to deny unauthorized connections. Changes to our systems are controlled by standard processes, and firewall rules are reviewed periodically.
Automation enables DutchTexan to scale with account needs, and rigorous configuration management is embedded in our infrastructure processing. Our highly automated environment expands capacity as needed. Server configurations are embedded in images and configuration files. Configuration changes are managed through a controlled change pipeline. Deviations from configuration baselines are detected and reverted within a predefined timeframe.
Actions and events within the DutchTexan application are comprehensively logged and stored in a central logging solution. Security logs are retained for investigation and response. Write access to log storage is tightly controlled and limited to essential personnel.
Alerting and Monitoring
DutchTexan invests in automated monitoring and alerting to address potential issues continuously. Our infrastructure alerts engineers to anomalies, triggering automatic responses or alerts for investigation and correction. Automated triggers respond to anomalous situations with predefined actions.
All account content is protected by firewall and application security. Monitoring tools alert on malicious behavior. Rules align with OWASP Top 10 guidelines, and protections from DDoS attacks are incorporated.
DutchTexan employs a multi-layered approach to vulnerability management using industry-recognized tools. Vulnerability scans and penetration tests identify risks, which are assessed and mitigated accordingly.
DutchTexan provides a multi-tenant SaaS solution with logical data separation. Authorization rules are continuously validated, and application authentication changes are logged.
Data is encrypted in transit with TLS and at rest with AES-256 encryption. Passwords are hashed and encrypted following industry best practices.
Encryption keys are securely managed, with TLS certificates renewed annually. At-rest encryption keys are stored in a Key Management System (KMS).
DutchTexan minimizes system downtime with redundancy built into services. Infrastructure is distributed across multiple availability zones.
DutchTexan leverages public cloud services for backup, without physical storage media.
Backups are protected through access control restrictions and WORM protections.
DutchTexan allows granular authorization rules. Accounts manage user privileges and access.
DutchTexan enforces a password policy and two-factor authentication. Administrators can require two-factor authentication for all users.
User access to data stores and infrastructure is controlled via role-based access. Direct network connections are prohibited.
Support and engagement staff have limited access to help accounts. Portal JITA provides temporary access for specific tasks.
Access to DutchTexan's network requires multifactor authentication. Password policies adhere to industry standards. Permissions are reviewed semi-annually.
DutchTexan conducts background checks and requires acknowledgment of security responsibilities.
DutchTexan maintains written policies and procedures, reviewed annually.
Employees complete CyberSafety training, including phishing awareness.
DutchTexan ensures vendor security and privacy controls. Sub-processors are listed in our Data Processing Agreement.
Refer to our Terms of Service and Privacy Policy for data processing details. DutchTexan does not store credit card information, relying on PCI-compliant processors.
DutchTexan does not sell personal data. Protections ensure data privacy and integrity.
Account data is retained while active. Data deletion requests are fulfilled per privacy regulations. Logs are retained for compliance needs.