By Hippo Video
See how hotels are winning 25% more group business.

Book a Demo

SECURITY

At Lyceum Technologies Inc., serving our customers with high availability and secured products is of our utmost concern. We are unswerving towards the quality and experience of our customer business and data, and take full accountability to ensure that our customers are well-versed about the processes and measures we have undertaken to secure their interests, all the while upholding customer privacy.

We are ISO/IEC 27001, SOC 2 Type II, and HIPAA certified.

Data Protection

  • Virtual Private Cloud
  • Role-based access
  • Data and Network Encryption
  • Physical and Network Security

Product Security

  • Virtual Private Cloud
  • Role-based access
  • Data and Network Encryption
  • Physical and Network Security

Resilient and Reliable Architecture

• Replication  • Data backup  • Capacity Management  • Monitoring

Data Protection

Virtual Private Cloud

Customer data is stored in a secure Virtual Private Cloud (VPC) hosted in Amazon Web Services. VPC is further segmented for security and manageability.

Role-based Access

Users are restricted to accessing only the required information and systems that are necessary to perform their job. This effectively enforces segregation of duties.

Data and Network Encryption

Data in transit and Data at rest are both encrypted. Communication is encrypted using TLS 1.2 for secured transmission. Data at rest is encrypted using AES-256 encryption.

Physical and Network Security

Our platform is hosted in data centers that comply with most of the global IT standards including CSA, ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3. All access to the data centers are tightly controlled and monitored 24 hours per day.

Product Security

Secure Development Process

All the changes in the product are put through a code review and security analysis process and tested by the Quality Team before the changes are released, ensuring the product quality and security.

Production Access Controls

Production access is restricted to a very few people based on their roles and responsibilities. Access controls are defined and executed for each and every role based on a need-to-know basis.

Resilient and Reliable Architecture

Replication

All our components are replicated in multiples across different availability zones. All our components are in real-time active-active mode and serving the traffic.

Data Backup

Data is replicated in n+1 and the replications are in active-active mode. We also take automated backup every day.

Capacity Management

We have an on-demand capacity expansion where limits are set liberally. We also proactively monitor and upgrade our thresholds. On-demand capacity expansion is in near real-time as provided by our hosting partner.

Monitoring

Tools are in place to proactively monitor the health and security of our systems. Our monitoring tools notify our infra and security teams to act upon them, if there is an anomaly in the system.