Driving Next-Gen Research Through Trust, Integrity, and Security

Prioritize data security, privacy, and compliance with our proprietary platform- Polly to protect sensitive biomedical data and ensure safe scientific collaboration.

Safeguarding Sensitive Data with Stringent Security Standards

Elucidata prioritizes the protection of sensitive data and intellectual property by implementing robust security practices and adhering to industry-leading standards for data protection.

Virtual Private Cloud

All compute resources are housed within a VPC, providing a secure, isolated segment of the cloud meticulously configured to meet our specific networking requirements.

Restricted Access Policy

We strictly adhere to this policy across all resources and user access, ensuring minimal access rights are granted, sufficient only for necessary functions, enhancing security, and reducing exposure.

Data Encryption

Utilizing AES 256 encryption, we secure all data at rest. In transit, data is protected with TLS encryption, safeguarding against interception and ensuring data integrity and confidentiality.

Database Security

Our databases are shielded by firewalls, accessible only within the VPC or by system administrators through a secure bastion host, with stringent controls on inbound traffic and SSH access.

Global Certifications

We ensure that Polly and its allied solutions adhere to the most rigorous industry standards and assist you in achieving compliance with our solutions.

SOC 2

Information Security

User Access and Product Security

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Multi-factor Authentication (MFA)

MFA is enforced for all administrators, significantly reducing the risk of unauthorized access through compromised credentials.

Comprehensive Access Logs

Polly offers customized access to AWS logs, enabling monitoring and auditing of resource and user activities within the production environment.

Encrypted Passwords

User passwords are securely salted and stored within AWS Cognito, ensuring that they remain inaccessible to any internal personnel.

Role-Based Access Control (RBAC)

RBAC enables fine-grained control over resource access, aligning with the Principle of Least Privilege, allowing assignment of roles and data access levels based on user responsibilities.

Infrastructure & Application Security

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Health Monitoring

Polly leverages Prometheus, Sentry, Mixpanel, AWS CloudWatch to monitor it’s services, with alerts configured for immediate notification of unexpected events.

Protection and Threat Detection

AWS tools such as WAF, GuardDuty, and Inspector are employed for enhanced web security, threat detection, and vulnerability scanning, with all compute resources securely isolated in a VPC.

Security Management and Compliance

AWS Security Hub and Config provide a unified view of the security posture and continuous compliance checks, ensuring adherence to security standards.

Risk Assessment

Elucidata conducts annual third-party VAPT audits, bi-annual vulnerability assessments, and risk assessments to identify and mitigate potential security risks across the organization.

Disaster Management and Recovery

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

Automated Backups

Daily backups for databases and filesystems, using AWS services with 120-day point-in-time recovery and cross-region encryption.

File Versioning

S3 file versioning is enabled to facilitate the recovery of accidentally deleted files upon request, enhancing data protection.

Compliance Standards

Lorem ipsum dolor sit amet consectetur. Dictumst faucibus nibh imperdiet phasellus vitae ut sit. Ut eros amet massa tellus orci. Vestibulum ac arcu est nulla non eget nulla. Eget pulvinar eu ac mi cursus elementum neque. Massa nisl fringilla platea diam faucibus nullam. In lacus mauris nec ultrices. Ut accumsan leo adipiscing montes proin.

SOC 2

Elucidata is SOC 2 Type 2 compliant, with an annual audit focused on the Security Pillar, ensuring adherence to rigorous standards for security, availability, processing integrity, confidentiality, and privacy.

HIPAA

Elucidata offers HIPAA-compliant standalone Polly deployments to protect “Protected Health Information” (PHI), aligning with national standards under the Privacy, Security, Breach Notification, and Public Safety Rules.

Multi-factor Authentication (MFA)

MFA is enforced for all administrators, significantly reducing the risk of unauthorized access through compromised credentials.

Comprehensive Access Logs

Polly offers customized access to AWS logs, enabling monitoring and auditing of resource and user activities within the production environment.

Encrypted Passwords

User passwords are securely salted and stored within AWS Cognito, ensuring that they remain inaccessible to any internal personnel.

Role-Based Access Control (RBAC)

RBAC enables fine-grained control over resource access, aligning with the Principle of Least Privilege, allowing assignment of roles and data access levels based on user responsibilities.

Health Monitoring

Polly leverages Prometheus, Sentry, Mixpanel, AWS CloudWatch to monitor it’s services, with alerts configured for immediate notification of unexpected events.

Protection and Threat Detection

AWS tools such as WAF, GuardDuty, and Inspector are employed for enhanced web security, threat detection, and vulnerability scanning, with all compute resources securely isolated in a VPC.

Security Management and Compliance

AWS Security Hub and Config provide a unified view of the security posture and continuous compliance checks, ensuring adherence to security standards.

Risk Assessment

Elucidata conducts annual third-party VAPT audits, bi-annual vulnerability assessments, and risk assessments to identify and mitigate potential security risks across the organization.

Automated Backups

Daily backups for databases and filesystems, using AWS services with 120-day point-in-time recovery and cross-region encryption.

File Versioning

S3 file versioning is enabled to facilitate the recovery of accidentally deleted files upon request, enhancing data protection.

SOC 2

Elucidata is SOC 2 Type 2 compliant, with an annual audit focused on the Security Pillar, ensuring adherence to rigorous standards for security, availability, processing integrity, confidentiality, and privacy.

HIPAA

Elucidata offers HIPAA-compliant standalone Polly deployments to protect “Protected Health Information” (PHI), aligning with national standards under the Privacy, Security, Breach Notification, and Public Safety Rules.

Security Documentation

Security Whitepaper

Elucidata is deeply committed to safeguarding customer data, employing state-of-the-art security and privacy measures to ensure the highest level of data protection.

Read More

Security and Data Transfer

With advanced encryption, real-time monitoring, and robust access controls, Elucidata provides unparalleled data security, setting a new benchmark in safeguarding sensitive information.

Read More
Blog

Healthcare Data Security: What You Don't Know Can Hurt You!

View Blog

Trusted by World's Leading Biopharma Companies

Learn More About
Polly's Security
request demo