Logging

Bloomreach has a dedicated security team that protects your data. A security incident management policy governs how events are reported, logged, communicated, prioritized, and resolved.

Monitoring

Highly available monitoring infrastructure continuously tracks data processing pipelines, application performance, resource usage, and system availability. When monitored thresholds are exceeded, alerts automatically trigger in an alert manager tool and reach an on-call developer. Escalation timelines and contacts are defined in the alert manager tool.

Incident response

When an unexpected system error occurs, the event is logged, and mitigating steps are taken. The Support team logs your reported incidents and provides updates throughout. You receive the information needed to report to local authorities, if required.

Vulnerability management

Internal and external vulnerability scans run at least annually. An independent third party performs penetration tests on the cloud platform at least once a year. To request recent scan results or learn more, contact your Customer Success Manager (CSM).

Application logs

Application logs are available upon request as an audit log. For details, see the Audit log feature.

Infrastructure logs

Central logging services and monitoring software collect data from the GCP cloud infrastructure to monitor system activity and access, and to identify potential security threats and vulnerabilities. A security management and data risk tool is used to prevent, detect, and respond to threats.


© Bloomreach, Inc. All rights reserved.