RADICL Security Commitments
Cybersecurity Program
RADICL has a Cybersecurity Program in place to protect the confidentiality, integrity, and availability of corporate and customer data. RADICL’s Cybersecurity Program follows the criteria set forth by the SOC2 Framework and NIST 800-171.
24x7 Security Monitoring and Response
RADICL Defense has a Security Operations Center that provides 24/7 monitoring and incident response across the entire company’s infrastructure.
Endpoint Protection, Network Monitoring, Cloud Security, and Vulnerability Management
RADICL Defense has deployed best-in-breed Endpoint Detection and Response capabilities, Network Monitoring capabilities, and Cloud Security Posture Management technology. It has also operationalized a robust and mature Vulnerability Management capability across all on-prem and cloud infrastructure.
Security Awareness Training
All RADICL employees go through Security Awareness Training. In addition, the entire RADICL team receives continuous phishing simulation exercises with on-the-spot training for failures and bi-weekly training snippets.
Cloud Infrastructure Security
RADICL leverages Amazon Web Services (AWS) for cloud infrastructure. AWS employs a robust security program with multiple certifications. For more information on our provider’s security processes, please visit AWS Security. In addition, RADICL employs Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP) technologies across its cloud infrastructure, monitored 24x7 by a team of SREs and Security Analysts.
Encryption
All user endpoints and cloud databases are encrypted, and all applications adhere to modern TLS/SSL standards for data in transit.
Business Continuity, Disaster Recover, and Incident Response
RADICL maintains Business Continuity, Disaster Recover, and Incident Response plans, and regularly performs table top exercises for each.
Access Control
RADICL adheres to the principle of least privilege for all accounts across production applications.
RADICL enforces Multi-Factor Authentication (MFA) where available.
Strong passwords are enforced on all endpoints, mobile devices, and applications where available, and a password manager is provided so users can manage and maintain complex passwords.
RADICL performs quarterly user access reviews.
If you have any questions or if you wish to report a potential security issue, please contact security@RADICL.com.