Security By Design

We back ourselves up with robust data security and privacy practices that form an integral part of our product engineering and service delivery principles.

Behind the scenes

Datalligence being a custodian of customers’ data, a multi-fold model of security architecture, robust product delivery and a highly resilient service platform are the key tenets of its service delivery.

Protecting your data

We understand the value of data. With our robust system of data safeguards, we allow you to focus on the data rather than on its security

Cloud Hosting

Hosted in Amazon Web Server, to have an end-to-end approach to secure and harden our SaaS Platform, including physical, operational, and software measures. (AWS Overview)

Access Controls

Role-based access through IAM that enforces segregation of duties and end-to-end audit trails ensuring access is in accordance with the security context.

Malware & Spam Protection

Malware and Spam protection is applied based on the latest threat signatures and supports real-time scanning and security.

DevOps Squad

Our DevOps sprints are powered by a multi-disciplinary Squad of members including the Product Owner, Squad Lead, Tribe Lead and Members, and Quality Assurance.

Segregation of Duties

Access to the production is restricted to a very limited set of users based on the job roles. Access to the production environment for developers and Quality Assurance team members are restricted based on their job responsibilities.

RESTful Architecture

Adoption of an architectural style that simplifies security. Based on the Representational State Transfer Technology, RESTful enables developers to safely expose web services with fine-grained modularity breaking the source code into logically atomic components each with its unique security context. RESTful further enables robust authentication powered by standards like OAuth and JWT.

Defense in depth using API Gateway

To protect the authentication tokens in transit, the APIs terminate in the gateway (HA Proxy) only on endpoints that accept HTTPS over TLS.
OAuth2 is used to authorize all API requests to the target API gateway, without exposing the components deeper in the platform such as Relational Databases and Business logic engines.

API throttling

The number of API calls is throttled (Rate limited) to mitigate application layer DDOS and Brute Force attacks.