At ©Allegion PLC, we understand that the confidentiality, integrity, and availability of your data are vital to your business, and we take our responsibility to protect it very seriously. Used on more than 70,000 projects around the world, OVERTUR™ helps professionals collaborate on projects while ensuring the safety of their data in the cloud through stringent security measures and procedures aligned with industry-standard security programs.
Application Security
Visibility and control of all project access
OVERTUR™ has implemented strict permission levels, so you can control who has access to your projects. These include:
- Collaborator (external)
External Collaborators (non-Allegion employees) can view all project data, transfer plan sets and door schedules, and assign hardware sets to openings. External Collaborators may also enter clarifications and read responses. They may not delete Hardware Sets. - Collaborator (Allegion)
Internal Collaborators can view all project data, transfer plan sets and door schedules, and assign hardware sets to openings. Collaborators may also enter clarifications and read responses. - Project Owner (external)
External Project Owners (non-Allegion employees), in addition to Collaborator (external) actions, can also transfer ownership of a project. - Project Owner (Allegion)
Internal Project Owners, in addition to Collaborator (Allegion) actions, can also transfer ownership of a project.
Industry-leading encryption in transit
All data transfers from a device to OVERTUR™’s secure cloud with industry-standard TLS encryption.
Secure authentication
Passwords are stored and transmitted securely and hashed using a strong salt.
OVERTUR™ utilizes the industry-standard authorization protocol OAuth 2.0.
Protection against application attacks
OVERTUR™ uses controls and technologies to prevent attackers from exploiting application-level vulnerabilities.
Infrastructure Security
Access control policies
Access to customer data internally is limited and provided only when absolutely required or requested by the customer. Code repositories are protected using multifactor authentication.
Risk mitigation
Document uploads are restricted to specific file types to prevent malicious code from executing on clients or on our cloud-hosting machines.
Automated vulnerability detection
OVERTUR™’s infrastructure is scanned regularly for common vulnerabilities.
DoS and DDoS protection
OVERTUR™’s applications and infrastructure are protected against Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, ensuring our high uptime.
Physical Security
Highly secure cloud
OVERTUR™ hosts data in Microsoft data centers, which is an industry leader in secure hosting facilities management. Read more about security at Microsoft.
Available Worldwide
World-class cloud service you can count on
Databases and infrastructure are available in multiple geographic regions in the United States, allowing resilience in the face of natural disasters or service interruptions.
Compliance
Application and data portability
OVERTUR™ provides well-documented and easily accessible interfaces to help ensure customer data is not ‘locked in’ and that the cost of moving to another cloud provider is minimal.
Third-party security assessments
OVERTUR™’s applications are tested using industry-leading vendors.
Third-party vendor review
Our vendors work just as hard as we do to ensure your data is safe and secure. All third-party vendors are audited for compliance with Allegion’s security standards.
Soc 2 Type 2 Attestation
A cover letter for the report can be provided upon request.
Our Full SOC 2 Report is available under NDA.
Comments
0 comments
Please sign in to leave a comment.