Our Commitment to Data Security & Trust at Objectways

At Objectways, trust is at the core of everything we do. We prioritize data protection, security, and compliance to ensure a secure environment for collaboration. With a focus on transparency, reliability, and adhering to the highest standards, such as SOC 2 Type II, HIPAA, and ISO 27001 certifications, we provide a peace of mind to our clients and partners. You can rely on us to uphold privacy and deliver with integrity, fostering long-term, trust-based relationships.

24/7 Security at Our Entry & Exit Gates

The entry and exit gates at our offices are secured 24/7. Metal detectors are installed to prevent unauthorized devices from entering secure areas, while security officers continuously monitor the premises to guarantee a safe environment at all times.

Access Control at Objectways

  • Biometric access control for secure entry and exit to sensitive areas.
  • Continuous CCTV surveillance at both entry and exit points for enhanced monitoring.
  • Logs of successful and failed attempts at both badge checkpoints and biometric scan checkpoints to ensure robust tracking.

Hardening Controls and Malware Protection

  • Strong hardening controls implemented on all laptops and workstations to protect against vulnerabilities.
  • Regular malware scans scheduled to identify and eliminate potential threats.
  • Strict quarantine policies deployed to isolate and mitigate risks from compromised devices.
  • Critical security patches are applied within 48 hours.

Ensuring Security with Background Checks and NDAs

  • Employees onboarded post-NDA and thorough background checks to establish trustworthiness.
  • Confidentiality agreements executed with all clients to protect sensitive information.
  • Our team is trained in HIPAA compliance and the proper handling of PII/ PHI to meet regulatory requirements.

Comprehensive Employee Training

  • Regular security awareness training programs are held to educate employees on best practices.
  • Classroom and intranet sessions are provided to reinforce security protocols and procedures.
  • Comprehensive emergency action plans are in place, with basic training on how to respond in case of a fire or smoke alarm.

Preventing Data Leaks

  • Domain policies are enforced to prevent unauthorized data extraction from employee machines.
  • Policies are in place to block screenshot capture and copy/paste actions for sensitive data.
  • Software downloads and installations are restricted to authorized applications only.

Advanced Network Security

  • A dedicated sandbox network is in place to isolate and protect critical systems.
  • Firewalls control incoming and outgoing traffic based on predefined security rules.
  • Zero trust network access (ZTNA), also known as software-defined perimeter (SDP), enables granular access to applications for authorized users only.

Restricted Email Access and Secure Internet Use

  • Email access is restricted to our network to prevent unauthorized access.
  • Internet access is limited to approved domains and sites for enhanced security.
  • Web traffic is continuously monitored, and protocols are used to detect and prevent potential threats.