Leading organizations rely on SparkBeyond to produce insights from their most sensitive data. As such, SparkBeyond takes security very seriously, and employs enterprise-grade security throughout all aspects of our business.
We implement risk-based and standards-based security protocols to secure both our services and customer data. Our comprehensive security program ensures compliance with industry standards and best-practices for information security, corporate controls, and software development.
Our Managed AI Cloud is SOC 2 Type II certified to ensure compliance with industry standards and best practices for information security, corporate controls, and privacy.
Sparkbeyond Discovery Platform can be hosted by SparkBeyond or on client infrastructure. In both cases the client gets an Isolated Virtual Machine not shared by other SparkBeyond clients to ensure the highest level of isolation and security.
Communication to SparkBeyond servers is protected with strong encryption, using at least TLS1.2.
SparkBeyond Discovery platform can be installed on client infrastructure, in client’s cloud account, or in client’s data center. Contact us regarding prerequisites for installing Discovery Platform on premise.
This gives clients who want the highest level of control over their data, and do not require close support and maintenance from SB personnel to maintain the system.
If hosted by SparkBeyond, we will host the platform for you and maintain it on either Amazon AWS, or Microsoft Azure, per client’s preference. Both cloud options meet the most stringent security requirements including meeting the standards: SOC2, PCI-DSS, and ISO27001
Servers holding client data can be placed in a region of choice, to match legal requirements (e.g EU/ US )
Beyond the strong authentication our platform provides, we can limit network access to relevant machines per client requirements (Typically limit access only from SparkBeyond and Client networks).
All access is on an as-needed basis, employing least privilege principles. Access to production environments is limited to authorized personnel only.
SparkBeyond verifies its product is secure, and performs internal security tests. The Discovery platform undergoes external professional penetration testing annually. This ensures no exploitable weakness or even significant other weakness exist in our system.
Apply key dataset transformations through no/low-code workflows to clean, prep, and scope your datasets as needed for analysis
Apply key dataset transformations through no/low-code workflows to clean, prep, and scope your datasets as needed for analysis
Apply key dataset transformations through no/low-code workflows to clean, prep, and scope your datasets as needed for analysis
Apply key dataset transformations through no/low-code workflows to clean, prep, and scope your datasets as needed for analysis
Apply key dataset transformations through no/low-code workflows to clean, prep, and scope your datasets as needed for analysis
Apply key dataset transformations through no/low-code workflows to clean, prep, and scope your datasets as needed for analysis