PatSeer-Fi-Logo-Large.png

Trust & Security

Trust & Security

Entrusted by leading global enterprises, PatSeer is your secure and reliable solution for data storage and powering critical applications. Our commitment to security, deeply ingrained in our ethos, is unwavering, regardless of your size or industry. 

PatSeer, established in 2013, is a product by Gridlogics Technologies Pvt. Ltd hailing from Pune, India, we promise an unparalleled reliability and world-class security for your data. Trust in PatSeer, and experience the power of true data security. 

Data Safeguards

Choose PatSeer for the ultimate experience in data safety, operating on a fully managed, secure AWS infrastructure, powered by a multi-tenant Kubernetes cluster. 

  • We safeguard your data in segregated containers, a fortress for your information. 
  • Your data enjoys iron-clad encryption, both at rest and during transit. 
  • Rest assured, your data serves a singular purpose: to service API calls, nothing else. 
  • We keep a vigilant eye on operational metrics to ensure the system’s health and performance stay optimal. 
  • Access is strictly controlled with role-based credentials for our service engineers, ensuring an extra layer of protection. 

Additional Safeguards for Dedicated-Cloud Deployments

As an enterprise customer, you’ll revel in our superior protection plus exclusive security measures: 

  • Dedicated AWS accounts ensure complete resource isolation. 
  • Benefit from a dedicated, single-tenant Kubernetes cluster. 
  • Experience complete network isolation from the internet – no unwanted connections. 
  • With AWS CloudTrail enabled, you enjoy audit logging. 
  • This top-tier security applies to all data, vector data, and metadata alike. 

SOC2 Type II

Experience the epitome of credibility with PatSeer’s SOC2 Type II certification. Adhering to the globally recognized COSO framework, our certification is validated by an external Big4 CPA firm, none other than EY. Our audit scope comprehensively covers Information Security, Availability, and Confidentiality. Trust PatSeer, a verified guardian of your data. 

GDPR

At PatSeer, we stand steadfast in aiding your GDPR compliance journey. We’ve put forth all necessary efforts to be GDPR-ready, ensuring your data’s sanctity is never compromised. Our Website Privacy Policy, Terms of Use, GDPR Policy, and Legal Disclaimer elucidate how we meticulously collect, utilize, and guard your information. With PatSeer, your data privacy is not just a promise, it’s an unyielding commitment. 

Penetration Tests

With PatSeer, your security is an ongoing commitment. We regularly subject ourselves to rigorous third-party security reviews, and promptly address findings based on their urgency and importance. For insights into our security diligence, executive summaries can be easily requested at hello@patseer.com.

Policies, Guidelines, and Practices for Protecting Data

PatSeer prioritizes the classification of information assets into public and confidential categories, with a special emphasis on our ‘PatSeer Third Party Confidential’ information, safeguarding our customers’ and partners’ data. 

We enforce an Acceptable Use Policy, governing all facets from user accounts and passwords to communication activities. Our access control policy educates employees in stringent access control management and user authorizations. 

Our HR policies robustly handle security issues, from pre-employment screening and background checks to off-boarding processes. 

We adhere to best practices in our Software Development Lifecycle (SDLC), with a defined process for change control in our systems and services.

Employee Access Lifecycle

At PatSeer, we tackle security issues at all stages of employment, ensuring a stringent vetting process before onboarding, maintaining strong security practices during employment, and carefully managing offboarding. New employees are swiftly integrated with data security training and adherence to our robust Information Security Policy, Acceptable Use Policy, and Code of Conduct. 

Every employee is given access rights tailored to their role and profile, safeguarded by both the business unit owner and Pinecone IT. With any position change, our CTO diligently updates authorizations following the Role-Based Access Control Matrix. Any change in position or access privileges is meticulously reported and documented by HR.

Risk Assessment Process

At PatSeer, we proactively engage in an annual Risk Assessment process to spot, evaluate, and manage risks that could potentially hamper our pursuit of excellence. Our process encapsulates risk identification, assessment, and mitigation, embedded within regular operations, fortified by vigilant management oversight. Our action plans, meticulously tracked by the COO, are promptly relayed to the relevant personnel. Trust in PatSeer, your partner in proactive risk management and resilience.

Incident Notification

PatSeer is equipped with a robust incident management policy, capable of swift identification, rectification, investigation, prevention, and follow-up of any security incidents. Our dedicated incident management team, helmed by the CEO and COO, springs into action during security incidents, always in compliance with relevant laws and regulations. 

The team’s reach extends to all employees deemed necessary, ensuring comprehensive coverage of every incident. Be it physical or electronic, any security anomaly triggers our tried-and-tested procedures, managed by our competent incident management team. Rely on PatSeer, your reliable shield in the face of security challenges.

Monitoring

PatSeer has a rigorous process for aggregating audit logs from vital components like Kubernetes, storage, and networking, with some auto-analyzed for immediate threat detection and others manually reviewed for possible intrusions. 

  • Code Vulnerability Scanner: We conduct weekly scans of our code base, swiftly rectifying any vulnerabilities identified. 
  • External Vulnerability Scanner: Our production environments are scanned quarterly to detect and mitigate network vulnerabilities. 
  • Events Threat Detections: Audit logs from our production environment are archived and meticulously analyzed.
Scroll to Top
PatSeer
Play Video