Message from the CEO: Primeritus’ digital trust mission is to protect information belonging to its employees, customers and partners. To that effect, Primeritus has built a cyber resilient culture, where employees and contractors are not only trained on industry best practices, but also act as first line of defense in detecting and preventing cyber attacks. Further, Primeritus has installed technical and procedural controls to prevent the sensitive data and intellectual property from being accessed in an unauthorized manner.

Security

Primeritus has implemented industry leading security solutions and practices for:

  • Policies and Procedures
  • Firewall, Intrusion Detection System
  • Cloud Workload Protection Platform
  • Identity and Access Management
  • Multi-factor authentication
  • Data Loss Prevention
  • Mobile Device Management
  • Security Operations Center / SIEM
  • Vulnerability Management
  • Application Security Testing

Privacy

Primeritus has implemented industry leading security solutions and practices for:

  • Policies and Procedures
  • Firewall, Intrusion Detection System
  • Cloud Workload Protection Platform
  • Identity and Access Management
  • Multi-factor authentication
  • Data Loss Prevention
  • Mobile Device Management

Compliance

SOC 2—Primeritus complies with SSAE 18 standards, and the controls are tested on an annual basis by an independent audit firm. Primeritus SOC 2 report includes the following trust service principles—Security, Availability and Confidentiality.

compliance-badge

Customer Inquiries : All inquiries about the digital trust program needs to be directed to security@primeritus.com. In order to manage the volume of inquiries we receive, and to ensure consistency in our approach, Primeritus has documented responses to the SIG Framework (full version). Customers interested in learning about Primeritus’ standards can request for the pre-filled SIG questionnaire and the SOC 2 report.

Customer Audits : Primeritus is fully committed to supporting customer audits. However, due to the volume of requests we receive, we request that you leverage our existing documentation prior to sending us information requests in the form of questionnaires and documentation request lists.