Overtur™ Security
At ©Allegion PLC, we understand that the confidentiality, integrity, and availability of your data are vital to your business, and we take our responsibility to protect it very seriously. Used on more than 70,000 projects around the world, OVERTUR™ helps professionals collaborate on projects while ensuring the safety of their data in the cloud through stringent security measures and procedures aligned with industry-standard security programs.
Allegion’s Overtur is a collaboration platform for the design, construction and management of openings. Choosing and installing the right doors, locks, and access control systems can be a complex task involving different requirements and unique standards.
Used on more than 70,000 projects around the world, Overtur helps architects, designers, BIM managers, engineers, general contractors, building managers and other building professionals collaborate on projects while protecting the safety of their data in the cloud through stringent security measures and procedures aligned with industry-standard security programs.
Application Security
Visibility and control of all project access
OVERTUR™ has implemented simple but strict permission levels, so you can control who has access to your projects. A Project Owner oversees permissions for project collaborators, and Overtur can assign roles with editor or reviewer status depending on the access needs of the project.
For more details on the two kinds of roles and permissions available please see Overtur Project Roles and Rights – Overtur Resource Center for further details.
Industry-leading encryption in transit
All data transfers from a device to Overtur’s secure cloud are protected with industry-standard Transport Layer Security (TLS) encryption, protecting the confidentiality and integrity of your information.
Multi Factor Authentication
Multi-Factor Authentication (MFA) is a standard feature in Overtur Key System Management, providing an additional layer of security. This solution requires users to enter a code generated by an authenticator application installed on their mobile device.
Secure authentication
Passwords are stored and transmitted securely and hashed using a strong salt.
OVERTUR™ utilizes the industry-standard authorization protocol OAuth 2.0.
Protection against application attacks
OVERTUR™ implements controls and technologies to safeguard against attackers from attempting to exploit application-level vulnerabilities.
Infrastructure Security
Access control policies
Access to customer data within Overtur is limited and granted only when absolutely required or requested by the customer. Additionally, code repositories are protected using multifactor authentication.
Risk mitigation
Document uploads are restricted to specific file types to prevent malicious code from executing on clients or on our cloud-hosting machines.
Automated vulnerability detection
OVERTUR™’s infrastructure is scanned regularly to identify common vulnerabilities.
DoS and DDoS protection
OVERTUR™’s applications and infrastructure are protected against Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, resulting in high availability.
Physical Security
Highly secure cloud
OVERTUR™ hosts data in Microsoft data centers, which is an industry leader in secure hosting facilities management. Read more about security at Microsoft.
Available Worldwide
World-class cloud service you can count on
Databases and infrastructure are available in multiple geographic regions in the United States, providing resilience against natural disasters or service interruptions.
Compliance
Application and data portability
OVERTUR™ provides well-documented and easily accessible interfaces to help ensure customer data is not ‘locked in’ and enabling a cost-effective transition to another provider if necessary.
Third-party security assessments
OVERTUR™’s applications are tested using trusted vendors, adhering to best practices and standards.
Third-party vendor review
Our vendors are committed to ensuring your data is safe and secure. All third-party vendors are audited for compliance with Allegion’s security standards.
Soc 2 Type 2 Attestation
A cover letter for the report can be provided upon request.
Our Full SOC 2 Report is available under NDA.
We are pleased to share that we have achieved a SOC 2 Type 2 attestation, demonstrating our commitment to maintaining the highest standards of security, availability, and data integrity. A cover letter summarizing the key aspects of the report is available upon request. The full SOC 2 Type 2 report can be provided upon execution of a non-disclosure agreement
Privacy and Terms
For detailed information on privacy practices and terms of use, you can refer to the following links:
Privacy Statement - https://profile.allegion.com/privacy-statement
Terms of Use - https://profile.allegion.com/terms-of-use
Comments
0 comments
Please sign in to leave a comment.