Secure by Design
Proximity is focused on security. We have been since day one.
Principle of Least Privilege
Access should be limited to only those with a legitimate business need and granted based on the principle of least privilege.
Defence-in-Depth
Security controls should be implemented and layered to provide multiple points of security, defence-in-depth.
Privacy
To ensure the privacy of your information, all data is transferred between user devices and Proximity servers using up to 256-bit encrypted connection via TLS 1.2 and a world-class certificate provider. The cryptographic keys used to secure Proximity are protected by Amazon’s Key Management Services.
Endpoint protection
All corporate devices are centrally managed and are equipped with mobile device management software and anti-malware protection. Endpoint security alerts are monitored with 24/7/365 coverage. We use MDM software to enforce secure configuration of endpoints, such as disk encryption, screen lock configuration, and more.
Governance
Proximity's Security and Privacy teams establish policies and controls, monitor compliance with those controls, and prove our security and compliance to third-party auditors.
Vulnerability Scanning
Proximity utilizes vulnerability scanning at key stages of our Secure Development Lifecycle (SDLC) to ensure that our platform maintains the highest level of security.
Security Practices
Proximity security includes processes to keep your data secure and accessible to the right people. We use best practices for security for the cloud providers that integrate with Proximity.