Security and Privacy at Thoughtswin Systems

Security and privacy are not just features; they are essential principles that safeguard trust with our clients.

At ThoughtsWin Systems, we prioritize the security and privacy of your data above all else. Our advanced protocols and cutting-edge technologies ensure that your information is protected with the highest standards. We employ robust encryption, rigorous access controls, and continuous monitoring to safeguard your data from any potential threats. Our commitment to data privacy is embedded in every aspect of our operations, guaranteeing that your information remains confidential and secure. Trust in ThoughtsWin Systems to provide not only innovative AI and data solutions but also the utmost security and privacy you deserve. Your peace of mind is our top priority.

Our foundational principles for Security and Privacy are:

Access limitation

Access should be restricted to individuals who have a valid business requirement and should be granted according to the principle of least privilege.

Uniform Implementation

Security controls should be uniformly implemented throughout all areas of the organization. 

Evolving continuously

The implementation of controls should be a progressive process, continuously evolving to enhance effectiveness, improve auditability, and reduce friction.

Data Protection

Data at rest

All datastores containing customer data, including Azure blob storage, are encrypted at rest. Sensitive collections and tables are further protected with row-level encryption. This ensures that the data is encrypted before it even reaches the database, so that neither physical nor logical access to the database can reveal the most sensitive information.

Data in transit

Thoughtswin Systems employs TLS 1.2 or higher for all data transmitted over potentially insecure networks. To further enhance data security during transit, we utilize features like HSTS (HTTP Strict Transport Security). Server TLS keys and certificates are managed by Azure and deployed through Application Gateways.

secret management

Encryption keys are handled through the Azure Key Vault, which stores key material in Hardware Security Modules (HSMs) to prevent any direct access, including by Microsoft or Thoughtswin employees. These keys are used for encryption and decryption through Azure’s Vault. 

Enterprise Security

Endpoint Protection

All corporate devices are centrally administered and feature mobile device management (MDM) software along with anti-malware protection. Endpoint security alerts are monitored around the clock, every day of the year. Our MDM software ensures secure configuration of endpoints, including disk encryption, screen lock settings, and regular software updates.

Security Remote Access

We are a cloud-based company and use Hotspot Shield’s VPN service to keep our employees secure.

Password Management

We ensure that all employees at Thoughtswin Systems have secure passwords using Dashlane as the password manager at Thoughtswin System. 

Security Education

Thoughtswin Systems ensures that all employees receive thorough security training during onboarding and annually via educational modules and Security education sessions. New hires must participate in a mandatory live security session covering key security principles, and developers have an additional session on secure coding practices. The security team also provides regular threat briefings to keep employees informed about crucial security updates and actions needed.

Identity and Access Management

Thoughtswin Systems uses Microsoft Entra ID as its IAM platform. We use O365 with Intune and Defender to keep our users secure. We enforce the use of phishing resistant factors, and have enforced MFA for all our employees. 

Thoughtswin System employees are granted access to applications based on their role, and automatically deprovisioned upon termination of their employment. Further access must be approved according to the policies set for each application.

Product Security

Thoughtswin Systems is planning to engage with a Penetration Testing consulting firm for its product DREX. All areas of the product and cloud infrastructure are in-scope for the Pen Test, and the source code will be fully available to the testers in order to maximize the effectiveness and coverage. Thoughtswin Systems requires Vulnerability Scanning of our cloud resources at key stages of our Secure Development Lifecycle.