Netrivals Security Standards

Netrivals is a solution specially designed to meet the needs of pricing departments in e-commerce businesses.

The security of our customers is key for Netrivals

Netrivals’s primary security focus is to safegaurd our customers’ and users’ data, which is why Netrivals has invested in the proper resources and controls to protect and service our customers. Our investment in security and privacy utilizes a security framework using best practices in the SaaS industry with our key objectives centering on:

  1. Data privacy and safety: Deliver a superior product and service to our users and customers while protecting the privacy and confidentiality of their data.

  2. Service continuity: Maintain ongoing availability of Netrivals and data to all authorized individuals.

  3. Data and Service Integrity: Ensure that user and customer data is never corrupted or altered inappropriately.

  4. Compliance and Best Practices: Our security partners ensure the implementation of processes and controls to align with current international regulatory and industry best practice guidance.

Netrivals values transparency when it comes to security and privacy to the extent that we can be without opening ourselves up to vulnerabilities. We are continuously improving the protections that have been implemented.

Data Privacy and Use

Data use: The data is strictly kept private and is not shared with third parties. Your data is only accessed by Netrivals’ technical and support teams in the case of a technical incident. 

GDPR Compliant: Netrivals maintains compliance with the EU’s General Data Protection Regulation and maintains product features, corporate protocols, and legal documents to help our users and customers comply.

Resiliency and Availability

  • 99.9% Uptime: Netrivals’ partners ensure that availability is consistently above 99.9%. Customer data is 100% backed up to multiple online replicas with additional snapshots.
  • 24x7x365 Monitoring: Our partners’ product and operations teams monitor application, software, and infrastructure behavior using proprietary and industry recognized solutions.
  • Data Center Redundancy: Netrivals’ partners maintain multiple failover instances to prevent outages from single points of failure.

Data Centers and Network Security

  • Utilize leading, compliant data centers: Netrivals products are hosted with the world’s leading data center providers. Access to these data centers is strictly controlled. These partners’ security management systems are aligned with ISO 27001 principles. They are compliant with a number of reinforced security requirements, including: PCI DSS, HDS, TSP, CSA, ISO 27017, ISO 27018 and CISPE. Their Hosted Private Cloud infrastructures hold ISO 27001, PCI DSS PSP, HDS, SOC I and II type 2 certifications and accreditations.
  • Diverse data center infrastructure: Netrivals infrastructure is distributed to ensure that single failure does not impact our users and customers. Mechanisms are managed to guarantee isolation and constant security of the infrastructure.
  • Network firewall protection: Netrivals prevents network attacks with monitoring and protections including tightly controlled network-level firewalling.
  • Anti-DDoS protection: Our partners include protection against all types of DDoS attacks in their dedicated hosting service. The web hosting provider has set up 9 anti-DDoS infrastructures with a capacity of 6x600Gps + 1x 240Gbps + 2x120Gbps across the group’s data centers.

Continuously Monitored Infrastructure

  • 3rd-Party Network Penetration Testing: our partners utilize industry-respected 3rd party penetration testing firms to test their network, product, and corporate infrastructure.
  • 3rd-Party Physical Penetration Testing: our partners utilize industry-respected 3rd party penetration testing firms to test physical office security.
  • Numerous external audits and assessments: All of the automated systems of our partners ensure that infrastructure administration and growth are managed following the very highest security standards. These are evaluated and improved all year round by internal audit teams, as well as external audit teams. This continuous improvement approach guarantees security that is adapted to combat the newest threats.