Skip to main content
search

SECURITY

We understand that your data and privacy are essential to the success, security, and competitive advantage of your organization. For this reason, we dedicate significant resources to protect your information and ensure a secure environment.

SECURITY FEATURES

Facilities and Disaster Recovery

Our server farms are hosted in state-of-the-art SOC 2 Type II-certified facilities in North America in multiple locations. To protect our customers’ data and ensure service reliability and availability, we utilize HOT / HOT redundant datacenter datacenters, and all data is replicated to disaster recovery and backup sites.

Infrastructure

We ensure all communications going to and coming from its servers are safe and secure. Our multi-pronged infrastructure security plan features :

  • Multi-tiered network security infrastructure to prevent security violations. Data encryption ensures your data is kept private and secure. Multiple firewalls and network scanners further secure all access to our servers. We regularly perform penetration testing and deploy the latest security updates to guarantee our system is always protected against new threats.
  • Application firewalls to further protect the system by preventing any malicious activity within the application. We use complex algorithms to ensure that the application is not manipulated in any way that may cause harm to your data.
  • Additional protection mechanisms such as anti-virus and application monitoring. Our products are monitored 24/7 to detect and report on any out-of-the-ordinary activities or failures. Several alert mechanisms are in place to escalate any such occurrences.
  • Ongoing penetration testing audits by multiple, credible third-party security testing firms.
  • Multi-layered backup, with local and off-site backups running at all times.

Protecting Your Organization's Data

We ensure that information is kept secure and private by preventing unauthorized users to access your data. Our security mechanisms restrict access to project data to all users except those who are registered to your organization.

User Authorization and Roles

Each user has a unique username and password that must be entered at the start of each session. We secure user IDs, passwords and other user information so they’re never jeopardized.

Roles and authorization mechanisms ensure that data access and user actions can be limited by each user’s role in the system. Supervisors have the capability to assign roles to specific users and grant them permissions as required.

CUSTOMIZATION TO MEET YOUR SECURITY

Contact an Odysseus representative to learn more.
Close Menu

Odysseus Solutions

The Future Of Emergency Management And Disaster Recovery Is Here

About Salient

OFFICE LOCATIONS
New York | Washington, D.C. | Miami | *Chicago* | St. Louis | Dallas | Denver | Los Angeles | Seattle
HEADQUARTERS
939 W. North Avenue, Suite 750, Chicago, IL 60642

T: 877.437.4271877.684.05574
E: odysseus@i-s-consulting.com