Prioritize data security, privacy, and compliance with our proprietary platform- Polly to protect sensitive biomedical data and ensure safe scientific collaboration.
Elucidata prioritizes the protection of sensitive data and intellectual property by implementing robust security practices and adhering to industry-leading standards for data protection.
All compute resources are housed within a VPC, providing a secure, isolated segment of the cloud meticulously configured to meet our specific networking requirements.
We strictly adhere to this policy across all resources and user access, ensuring minimal access rights are granted, sufficient only for necessary functions, enhancing security, and reducing exposure.
Utilizing AES 256 encryption, we secure all data at rest. In transit, data is protected with TLS encryption, safeguarding against interception and ensuring data integrity and confidentiality.
Our databases are shielded by firewalls, accessible only within the VPC or by system administrators through a secure bastion host, with stringent controls on inbound traffic and SSH access.
We ensure that Polly and its allied solutions adhere to the most rigorous industry standards and assist you in achieving compliance with our solutions.
Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.
MFA is enforced for all administrators, significantly reducing the risk of unauthorized access through compromised credentials.
Polly offers customized access to AWS logs, enabling monitoring and auditing of resource and user activities within the production environment.
User passwords are securely salted and stored within AWS Cognito, ensuring that they remain inaccessible to any internal personnel.
RBAC enables fine-grained control over resource access, aligning with the Principle of Least Privilege, allowing assignment of roles and data access levels based on user responsibilities.
Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.
Polly leverages Prometheus, Sentry, Mixpanel, AWS CloudWatch to monitor it’s services, with alerts configured for immediate notification of unexpected events.
AWS tools such as WAF, GuardDuty, and Inspector are employed for enhanced web security, threat detection, and vulnerability scanning, with all compute resources securely isolated in a VPC.
AWS Security Hub and Config provide a unified view of the security posture and continuous compliance checks, ensuring adherence to security standards.
Elucidata conducts annual third-party VAPT audits, bi-annual vulnerability assessments, and risk assessments to identify and mitigate potential security risks across the organization.
Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.
Daily backups for databases and filesystems, using AWS services with 120-day point-in-time recovery and cross-region encryption.
S3 file versioning is enabled to facilitate the recovery of accidentally deleted files upon request, enhancing data protection.
Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.
Elucidata is SOC 2 Type 2 compliant, with an annual audit focused on the Security Pillar, ensuring adherence to rigorous standards for security, availability, processing integrity, confidentiality, and privacy.
Elucidata offers HIPAA-compliant standalone Polly deployments to protect “Protected Health Information” (PHI), aligning with national standards under the Privacy, Security, Breach Notification, and Public Safety Rules.
MFA is enforced for all administrators, significantly reducing the risk of unauthorized access through compromised credentials.
Polly offers customized access to AWS logs, enabling monitoring and auditing of resource and user activities within the production environment.
User passwords are securely salted and stored within AWS Cognito, ensuring that they remain inaccessible to any internal personnel.
RBAC enables fine-grained control over resource access, aligning with the Principle of Least Privilege, allowing assignment of roles and data access levels based on user responsibilities.
Polly leverages Prometheus, Sentry, Mixpanel, AWS CloudWatch to monitor it’s services, with alerts configured for immediate notification of unexpected events.
AWS tools such as WAF, GuardDuty, and Inspector are employed for enhanced web security, threat detection, and vulnerability scanning, with all compute resources securely isolated in a VPC.
AWS Security Hub and Config provide a unified view of the security posture and continuous compliance checks, ensuring adherence to security standards.
Elucidata conducts annual third-party VAPT audits, bi-annual vulnerability assessments, and risk assessments to identify and mitigate potential security risks across the organization.
Daily backups for databases and filesystems, using AWS services with 120-day point-in-time recovery and cross-region encryption.
S3 file versioning is enabled to facilitate the recovery of accidentally deleted files upon request, enhancing data protection.
Elucidata is SOC 2 Type 2 compliant, with an annual audit focused on the Security Pillar, ensuring adherence to rigorous standards for security, availability, processing integrity, confidentiality, and privacy.
Elucidata offers HIPAA-compliant standalone Polly deployments to protect “Protected Health Information” (PHI), aligning with national standards under the Privacy, Security, Breach Notification, and Public Safety Rules.
Elucidata is deeply committed to safeguarding customer data, employing state-of-the-art security and privacy measures to ensure the highest level of data protection.
With advanced encryption, real-time monitoring, and robust access controls, Elucidata provides unparalleled data security, setting a new benchmark in safeguarding sensitive information.
Elucidata ensures stringent security through:
Yes, Elucidata complies with industry security standards through SOC 2 Type 2 attestation and AWS Foundational Technical Review (FTR) approval. It ensures security, reliability, and regulatory compliance.
Yes, Elucidata is GDPR-compliant. Production data is stored on US servers, and Elucidata is willing to sign a Standard Contractual Clause (SCC) to ensure secure and lawful data transfer. As a Data Importer, Elucidata upholds GDPR requirements, including robust data protection and compliance measures.
Elucidata conducts annual audits to uphold its security policies.
Backups are encrypted, stored in a separate AWS region, and performed daily. They are retained for 60 days.
Yes, Elucidata prioritizes data protection law compliance. While no Personal Identifiable Information (PII) or Protected Health Information (PHI) is stored, Elucidata ensures secure and efficient login processes by retaining only essential details such as names and email addresses. Robust security measures are in place to safeguard this data and comply with all relevant regulations.
Security incidents are reported to security@elucidata.io, triggering the automatic creation of a Jira ticket. These incidents are prioritized by severity and assigned for resolution. In the event of major breaches, stakeholders, including customers and users, are promptly notified.
No, proprietary information from Polly is not shared with third-party vendors.
Yes, Elucidata has a comprehensive Information Security Policy for Polly, which is reviewed annually by the Security Committee.
Polly’s infrastructure is hosted on AWS within a dedicated Virtual Private Cloud (VPC), ensuring full control over networking and security.
These measures ensure strong data privacy and protection.
Yes, Elucidata has a dedicated security team, including a Cybersecurity Specialist, Director of Engineering, and IT Manager. We also collaborate with external vendors such as Akitra Inc., Astra Security, Prescient Assurance, SentinelOne, and SpringVerify for enhanced security.
Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.
Elucidata leverages AWS services to ensure code security and prevent misconfigurations:
These services work together to maintain secure, compliant operations.
Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.
Polly is designed for researchers, scientists, and professionals in biopharma and life sciences. It is used by leading biopharma companies for critical applications such as:
You can request a demo by clicking the "Request Demo" button on the website or contacting Elucidata directly at info@elucidata.io.