Security at Bear Cognition
At Bear Cognition, we prioritize your security and privacy above all. We are dedicated to safeguarding your data with the highest standards of security measures in place.
Data Security
Bear Cognition encrypts all customer data, both at rest and in transit. We employ Amazon Web Services Key Management System (KMS) for managing encryption keys with the support of hardware security modules, ensuring top-tier security aligned with industry best practices. Our data transfer processes are secured through encrypted services such as Fivetran, maintaining the integrity of your data during transit. Additionally, Bear Cognition complies with SOC2 Type II and HIPAA regulations, reflecting our commitment to robust security protocols.
Application Security
Bear Cognition engages with leading application security experts for regular third-party penetration tests. These security assessments thoroughly examine our source code, operational applications, and deployment environments. Furthermore, we leverage advanced static analysis tools provided by GitHub Advanced Security, including CodeQL, Secrets Scanner, and Dependabot, to enhance our product security throughout the development lifecycle.
Infrastructure Security
Our infrastructure is hosted on Amazon Web Services, where we utilize an array of security products such as KMS, GuardDuty, and Inspector. Additionally, we employ premier infrastructure monitoring tools like DataDog to continuously oversee and respond to any anomalies within our infrastructure.
Continuous Security Monitoring with Drata
Bear Cognition uses Drata for continuous security monitoring. Drata rigorously tests our security and IT infrastructure daily against industry-standard benchmarks to ensure we maintain a robust security stance. This proactive approach helps us identify and address any gaps or vulnerabilities effectively.
Drata's comprehensive monitoring extends to our infrastructure accounts, version control systems, developer tools, task trackers, endpoints, and internal policies. By maintaining continuous oversight, Drata ensures that our security measures are always up to par with established frameworks.
Security Report Access
For detailed insights into our security practices and real-time updates on improvements, Bear Cognition's customers and partners can access our security reports through Drata. This report is continuously updated to reflect our ongoing efforts to enhance security:
Bear Cognition is dedicated to providing a secure environment for all our users. Our continuous improvements and transparency about our security posture underline our commitment to your data protection.