Security Program Highlights

Data Security

Seerist encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.

Application Security

Seerist regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment. 

Seerist also uses high-quality static analysis tooling provided by SonarQube and Dependency Scanning from Nexus to secure our product at every step of the development process. 

Infrastructure Security

Seerist uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector. 

In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.

You are the Center of Our Universe

I go to your platform first, every time. What used to take us 8 hours now takes 2, and the quality of our products has increased due to using Seerist.
Homeland Security User
I was getting immediate reports and sending them up the chain even before people in the field knew about it.
Law Enforcement User
Due to the complexity of our operations, we went with the CORE product [now from Seerist] for it’s extensive possibilities in risk monitoring, situational awareness and threat identification
Major International Airline

Our website uses cookies. By agreeing, you accept the use of cookies in accordance with our cookie policy.  Continued use of our website automatically accepts our terms.

Close Popup