Security Program Highlights
Data Security
Seerist encrypts data at rest and in transit for all of our customers. We use tools like Amazon Web Service’s Key Management System (KMS) to manage encryption keys using hardware security modules for maximum security in line with industry best practices.
Application Security
Seerist regularly engages some of the industry’s best application security experts for third-party penetration tests. Our penetration testers evaluate the source code, running application, and the deployed environment.
Seerist also uses high-quality static analysis tooling provided by SonarQube and Dependency Scanning from Nexus to secure our product at every step of the development process.
Infrastructure Security
Seerist uses Amazon Web Services to host our application. We make full use of the security products embedded within the AWS ecosystem, including KMS, GuardDuty, and Inspector.
In addition, we deploy our application using containers run on AWS managed services, meaning we typically do not manage servers or EC2 instances in production.
2024 Q2 Security Incident Report
Learn key trends in our Q2 2024 security incident report, analyzing incidents of war, terrorism, and crime, and providing forecasts for the future.
Electronic Defense Firm Leverages Seerist for Pre-Travel Intelligence Reports
Electronic Defense Firm saves time, enhances efficiency, and boosts team confidence with Seerist’s pre-travel intelligence.
The Balancing Act: Speed vs. Accuracy in Decision Making
Explore the intricate balance between speed and accuracy in security intelligence. Learn how analysts can navigate the pressure for rapid insights without compromising on the quality of their assessments. Discover strategies for leveraging technology, prioritizing tasks, and maintaining stakeholder trust in high-stakes situations.