At Lyceum Technologies Inc., serving our customers with high availability and secured products is of our utmost concern. We are unswerving towards the quality and experience of our customer business and data, and take full accountability to ensure that our customers are well-versed about the processes and measures we have undertaken to secure their interests, all the while upholding customer privacy.
Resilient and Reliable Architecture
• Replication • Data backup • Capacity Management • Monitoring
Customer data is stored in a secure Virtual Private Cloud (VPC) hosted in Amazon Web Services. VPC is further segmented for security and manageability.
Users are restricted to accessing only the required information and systems that are necessary to perform their job. This effectively enforces segregation of duties.
Data in transit and Data at rest are both encrypted. Communication is encrypted using TLS 1.2 for secured transmission. Data at rest is encrypted using AES-256 encryption.
Our platform is hosted in data centers that comply with most of the global IT standards including CSA, ISO 27001, ISO 27018, SOC 1, SOC 2, SOC 3. All access to the data centers are tightly controlled and monitored 24 hours per day.
All the changes in the product are put through a code review and security analysis process and tested by the Quality Team before the changes are released, ensuring the product quality and security.
Production access is restricted to a very few people based on their roles and responsibilities. Access controls are defined and executed for each and every role based on a need-to-know basis.
All our components are replicated in multiples across different availability zones. All our components are in real-time active-active mode and serving the traffic.
Data is replicated in n+1 and the replications are in active-active mode. We also take automated backup every day.
We have an on-demand capacity expansion where limits are set liberally. We also proactively monitor and upgrade our thresholds. On-demand capacity expansion is in near real-time as provided by our hosting partner.
Tools are in place to proactively monitor the health and security of our systems. Our monitoring tools notify our infra and security teams to act upon them, if there is an anomaly in the system.