Security at Set Solutions, Inc.

At Set Solutions, security is our passion and the cornerstone of our mission. We take the security of our customer’s data seriously, whether inside their environment or ours. Please read below for details on how Set Solutions proactively protects its customers and their businesses.

Security Program Highlights

Information Security Roles and Responsibilities

Set Solutions is committed to conducting business in compliance with all applicable laws, regulations, and company policies. Set Solutions has adopted policies that outline the security measures required to protect electronic information systems and related equipment from unauthorized use. Information Security roles have been established to provide clearly defined responsibilities and an understanding of how information protection is to be accomplished.

Infrastructure Security

Set Solutions hosts its infrastructure in cloud service provider environments and leverages security services embedded within those ecosystems, such as encryption, threat detection, and vulnerability detection and management. In addition, Set Solutions deploys best-of-breed cybersecurity technologies to prevent, detect, and respond to any unauthorized activity within its network.

Data Security

Set Solutions evaluates the risks inherent in storing data and implements cryptographic controls to mitigate those risks where deemed appropriate. Strong cryptography with associated key management processes and procedures has been implemented and documented where encryption is in use. All encryption is performed following industry standards. Set Solutions maintains and follows data management policies governing the classification, labeling, handling, retention, and disposal of data.

Secure Development Practices

Set Solutions follows secure system engineering principles that are established, documented, maintained, and applied to any information system implementation efforts. Set Solutions follows secure-by-design and privacy-by-design principles and performs system security testing, application vulnerability management, system acceptance testing, version and change control, and other technical reviews within its secure development environment.