Logging
Bloomreach has a dedicated security team that protects your data. A security incident management policy governs how events are reported, logged, communicated, prioritized, and resolved.
Monitoring
Highly available monitoring infrastructure continuously tracks data processing pipelines, application performance, resource usage, and system availability. When monitored thresholds are exceeded, alerts automatically trigger in an alert manager tool and reach an on-call developer. Escalation timelines and contacts are defined in the alert manager tool.
Incident response
When an unexpected system error occurs, the event is logged, and mitigating steps are taken. The Support team logs your reported incidents and provides updates throughout. You receive the information needed to report to local authorities, if required.
Vulnerability management
Internal and external vulnerability scans run at least annually. An independent third party performs penetration tests on the cloud platform at least once a year. To request recent scan results or learn more, contact your Customer Success Manager (CSM).
Application logs
Application logs are available upon request as an audit log. For details, see the Audit log feature.
Infrastructure logs
Central logging services and monitoring software collect data from the GCP cloud infrastructure to monitor system activity and access, and to identify potential security threats and vulnerabilities. A security management and data risk tool is used to prevent, detect, and respond to threats.
Updated 13 days ago
