Security & Privacy

We use enterprise-grade security practices to keep your data safe.

As customers entrust Eber with some of their most valuable data, keeping customer data safe is our priority. Eber undergoes regular tests performed by 3rd parties, encrypts data at rest and in-transit, and our solution is designed to be compliant with privacy laws such as GDPR of Europe and PDPA in Singapore.

Role-Based Access Control Features (RBAC)

RBAC and security features work together to create a comprehensive protective framework for your data, ensuring both accessibility and protection at every level.

Admin Access Role

Our granular control over functionality provides customizable access levels including full access, read-only, or blocked permissions. This reduces the risk of unauthorized data manipulation, enables precise control over user permissions, and simplifies compliance with security protocols.

Role-Based PII Data Masking

Protected contact information handling includes controlled visibility of Personally Identifiable Information (PII) based on user roles. This ensures compliance with data protection regulations and minimizes the risk of potential data breaches.

CRM Data Access by Segment

Our system provides role-based access to specific user segments within the CRM, allowing administrators to control which team members can view and manage different customer groups based on their responsibilities and need-to-know basis.

IP Restriction

IP restriction enhances security through network-level control, ensuring access only from authorized corporate networks or VPN connections. This prevents unauthorized access attempts from unsecured networks and maintains data integrity within trusted network boundaries.

Content Management Controls

Page-level security implementation offers specific access restrictions for different admin roles with controlled form submission permissions. The system maintains a comprehensive audit trail of content access and modifications, enhancing data governance and compliance requirements.

Data & Application

Data and application security-related features maximize your ability to ensure data security.

Data encryption

Eber encrypts your data aligning with industry-tested and accepted standards. We use TLS 1.2 minimum for data in transit and encryption at rest for all instances and databases. We use AES-256-bit encryption to secure your database connection credentials and data stored at rest.

Web Application Firewall

Industry-leading Web Application Firewall with automatic updates to block against the latest threats spotted around the world.

Audit Log

Access to admin and customer portal actions are logged in encrypted storage. Data changes by authorised or unauthorized are recorded for investigation purposes.

Secure Software Development

Eber utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

Backup & Recovery

Data protection protocols include automated daily backups with geographic data redundancy. Quick disaster recovery procedures and regular backup integrity testing ensure business continuity and data preservation in any scenario.

Infrastructure

Secure and reliable infrastructure is key to Eber platform.

AWS

Eber uses Amazon Web Services (AWS) for secure and resilient hosting. AWS data centres are monitored by 24×7 security, biometric scanning, and video surveillance and are continuously certified across a variety of global security and compliance frameworks.

Vulnerability management

Eber regularly scans production infrastructure, applications and networks for vulnerabilities performed by 3rd parties to identify potential vulnerabilities that could impact our systems.

DNSSEC

DNSSEC to block DNS hijacking attacks. We go in-depth, enabling every security measure we can.

DDoS Protection

DDoS protection is enabled against all known infrastructure attacks to minimize application downtime and latency.

Organizational and Operational Security

Employee

Eber personal completes ongoing security training, including topics like information security, data privacy, and password security. We ensure all employees participate in helping secure our customer data and company assets.

Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

Vendor

Eber maintains vendor risk management practices to ensure third parties are scrutinized and maintain expected levels of security controls.

Continuous Security Control Monitoring

Eber automates and continuously monitor 100+ internal security controls across the organization against the highest possible standards. Automated alerts and evidence collection allow Eber to confidently prove its security and compliance posture any day of the year while fostering a security-first mindset and culture of compliance across the organization.

Enterprise-grade compliance

GDPR

We have worked to enhance our products, processes, and procedures to ensure our practices are GDPR-compliant.

ISO 27001

Eber is currently in the process of pursuing our ISO 27001 Certification. We adhering to the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).

6163e3a7c7cfea90b185000d gdpr compliant badge
Prighter certificate of Art 27 representation

Eber is committed to achieving and maintaining the trust of our customers, partners, and employees through these efforts. If you have any security or privacy questions please contact us at security@eber.co.