Driving Next-Gen Research Through Trust, Integrity, and Security

Prioritize data security, privacy, and compliance with our proprietary platform- Polly to protect sensitive biomedical data and ensure safe scientific collaboration.

Safeguarding Sensitive Data with Stringent Security Standards

Elucidata prioritizes the protection of sensitive data and intellectual property by implementing robust security practices and adhering to industry-leading standards for data protection.

Virtual Private Cloud

All compute resources are housed within a VPC, providing a secure, isolated segment of the cloud meticulously configured to meet our specific networking requirements.

Restricted Access Policy

We strictly adhere to this policy across all resources and user access, ensuring minimal access rights are granted, sufficient only for necessary functions, enhancing security, and reducing exposure.

Data Encryption

Utilizing AES 256 encryption, we secure all data at rest. In transit, data is protected with TLS encryption, safeguarding against interception and ensuring data integrity and confidentiality.

Database Security

Our databases are shielded by firewalls, accessible only within the VPC or by system administrators through a secure bastion host, with stringent controls on inbound traffic and SSH access.

Global Certifications

We ensure that Polly and its allied solutions adhere to the most rigorous industry standards and assist you in achieving compliance with our solutions.

SOC 2

Information Security

User Access and Product Security

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Multi-factor Authentication (MFA)

MFA is enforced for all administrators, significantly reducing the risk of unauthorized access through compromised credentials.

Comprehensive Access Logs

Polly offers customized access to AWS logs, enabling monitoring and auditing of resource and user activities within the production environment.

Encrypted Passwords

User passwords are securely salted and stored within AWS Cognito, ensuring that they remain inaccessible to any internal personnel.

Role-Based Access Control (RBAC)

RBAC enables fine-grained control over resource access, aligning with the Principle of Least Privilege, allowing assignment of roles and data access levels based on user responsibilities.

Infrastructure & Application Security

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Health Monitoring

Polly leverages Prometheus, Sentry, Mixpanel, AWS CloudWatch to monitor it’s services, with alerts configured for immediate notification of unexpected events.

Protection and Threat Detection

AWS tools such as WAF, GuardDuty, and Inspector are employed for enhanced web security, threat detection, and vulnerability scanning, with all compute resources securely isolated in a VPC.

Security Management and Compliance

AWS Security Hub and Config provide a unified view of the security posture and continuous compliance checks, ensuring adherence to security standards.

Risk Assessment

Elucidata conducts annual third-party VAPT audits, bi-annual vulnerability assessments, and risk assessments to identify and mitigate potential security risks across the organization.

Disaster Management and Recovery

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Automated Backups

Daily backups for databases and filesystems, using AWS services with 120-day point-in-time recovery and cross-region encryption.

File Versioning

S3 file versioning is enabled to facilitate the recovery of accidentally deleted files upon request, enhancing data protection.

Compliance Standards

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

SOC 2

Elucidata is SOC 2 Type 2 compliant, with an annual audit focused on the Security Pillar, ensuring adherence to rigorous standards for security, availability, processing integrity, confidentiality, and privacy.

HIPAA

Elucidata offers HIPAA-compliant standalone Polly deployments to protect “Protected Health Information” (PHI), aligning with national standards under the Privacy, Security, Breach Notification, and Public Safety Rules.

Multi-factor Authentication (MFA)

MFA is enforced for all administrators, significantly reducing the risk of unauthorized access through compromised credentials.

Comprehensive Access Logs

Polly offers customized access to AWS logs, enabling monitoring and auditing of resource and user activities within the production environment.

Encrypted Passwords

User passwords are securely salted and stored within AWS Cognito, ensuring that they remain inaccessible to any internal personnel.

Role-Based Access Control (RBAC)

RBAC enables fine-grained control over resource access, aligning with the Principle of Least Privilege, allowing assignment of roles and data access levels based on user responsibilities.

Health Monitoring

Polly leverages Prometheus, Sentry, Mixpanel, AWS CloudWatch to monitor it’s services, with alerts configured for immediate notification of unexpected events.

Protection and Threat Detection

AWS tools such as WAF, GuardDuty, and Inspector are employed for enhanced web security, threat detection, and vulnerability scanning, with all compute resources securely isolated in a VPC.

Security Management and Compliance

AWS Security Hub and Config provide a unified view of the security posture and continuous compliance checks, ensuring adherence to security standards.

Risk Assessment

Elucidata conducts annual third-party VAPT audits, bi-annual vulnerability assessments, and risk assessments to identify and mitigate potential security risks across the organization.

Automated Backups

Daily backups for databases and filesystems, using AWS services with 120-day point-in-time recovery and cross-region encryption.

File Versioning

S3 file versioning is enabled to facilitate the recovery of accidentally deleted files upon request, enhancing data protection.

SOC 2

Elucidata is SOC 2 Type 2 compliant, with an annual audit focused on the Security Pillar, ensuring adherence to rigorous standards for security, availability, processing integrity, confidentiality, and privacy.

HIPAA

Elucidata offers HIPAA-compliant standalone Polly deployments to protect “Protected Health Information” (PHI), aligning with national standards under the Privacy, Security, Breach Notification, and Public Safety Rules.

Security Documentation

Security Whitepaper

Elucidata is deeply committed to safeguarding customer data, employing state-of-the-art security and privacy measures to ensure the highest level of data protection.

Read More

Security and Data Transfer

With advanced encryption, real-time monitoring, and robust access controls, Elucidata provides unparalleled data security, setting a new benchmark in safeguarding sensitive information.

Read More
Blog

Healthcare Data Security: What You Don't Know Can Hurt You!

View Blog

FAQs

What measures does Elucidata take for authorization, authentication, and accountability?

Elucidata ensures stringent security through:

  • Zero Trust Policy: Implements strong protections against credential compromises.
  • Multi-Factor Authentication (MFA): Enabled for all administrators.
  • Access Logs: Available upon request for monitoring resource and user activity.
  • Encrypted Passwords: Securely stored in AWS Cognito, inaccessible to Elucidata.
  • Role-Based Access Control (RBAC): Enforces least privilege access with customizable roles and permissions.
  • Health Monitoring: Monitors system health in real-time with alerts via Prometheus.
  • Risk Assessment: Conducts annual third-party VAPT audits and biannual vulnerability assessments.

Does Elucidata comply with industry security standards, and how does it ensure compliance?

Yes, Elucidata complies with industry security standards through SOC 2 Type 2 attestation and AWS Foundational Technical Review (FTR) approval. It ensures security, reliability, and regulatory compliance.

Is Elucidata (General Data Protection Regulation) GDPR-compliant?

Yes, Elucidata is GDPR-compliant. Production data is stored on US servers, and Elucidata is willing to sign a Standard Contractual Clause (SCC) to ensure secure and lawful data transfer. As a Data Importer, Elucidata upholds GDPR requirements, including robust data protection and compliance measures.

How often does Elucidata conduct internal audits to ensure compliance?

Elucidata conducts annual audits to uphold its security policies.

How is data backup and encryption managed?

Backups are encrypted, stored in a separate AWS region, and performed daily. They are retained for 60 days.

What measures are in place for data protection law compliance?

Yes, Elucidata prioritizes data protection law compliance. While no Personal Identifiable Information (PII) or Protected Health Information (PHI) is stored, Elucidata ensures secure and efficient login processes by retaining only essential details such as names and email addresses. Robust security measures are in place to safeguard this data and comply with all relevant regulations.

What is the process for restoring security functions and handling security incidents at Elucidata?

Security incidents are reported to security@elucidata.io, triggering the automatic creation of a Jira ticket. These incidents are prioritized by severity and assigned for resolution. In the event of major breaches, stakeholders, including customers and users, are promptly notified.

Are third parties given access to any proprietary information from Polly?

No, proprietary information from Polly is not shared with third-party vendors.

Does Elucidata maintain an Information Security Policy for Polly?

Yes, Elucidata has a comprehensive Information Security Policy for Polly, which is reviewed annually by the Security Committee.

What measures does Elucidata take for Data Privacy & Protection?

Polly’s infrastructure is hosted on AWS within a dedicated Virtual Private Cloud (VPC), ensuring full control over networking and security.

  • Principle of Least Privilege: Resources and users have minimal access needed for function.
  • Encryption at Rest: Data is encrypted with AES 256 encryption across storage and processing.
  • Encryption in Transit: TLS encrypts data during transfer to protect against interception.
  • Database Security: Databases are protected by firewalls and accessible only via specific internal access points.
  • Private Docker Domain: Docker images are private, accessible only by system admins, with data deletions available on request.

These measures ensure strong data privacy and protection.

Does Elucidata have a dedicated security team?

Yes, Elucidata has a dedicated security team, including a Cybersecurity Specialist, Director of Engineering, and IT Manager. We also collaborate with external vendors such as Akitra Inc., Astra Security, Prescient Assurance, SentinelOne, and SpringVerify for enhanced security.

What are the measures taken by Elucidata for Code Security & Security Misconfigurations?

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Elucidata leverages AWS services to ensure code security and prevent misconfigurations:

  • AWS Security Hub: Manages security posture and automates remediation.
  • Amazon GuardDuty: Monitors AWS accounts for malicious activity.
  • Amazon Inspector: Scans for vulnerabilities and security flaws in code.
  • AWS CloudTrail: Provides auditing and compliance for AWS accounts.

These services work together to maintain secure, compliant operations.

Who are the intended users of Elucidata's platform, Polly, and what are its key applications?

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Polly is designed for researchers, scientists, and professionals in biopharma and life sciences. It is used by leading biopharma companies for critical applications such as:

  • Target Identification: Finding drug targets for therapeutic interventions.
  • Biomarker Discovery: Identifying biomarkers for disease diagnosis and prognosis.
  • Meta-analysis: Aggregating and analyzing data from multiple studies.
  • Signature Exploration: Investigating molecular signatures for precision medicine.

How can I request a demo of Polly?

You can request a demo by clicking the "Request Demo" button on the website or contacting Elucidata directly at info@elucidata.io.

Trusted by World's Leading Biopharma Companies

Learn More About
Polly's Security
request demo