Data Security &
Privacy

Industry-leading data security & privacy

At Poppulo, we are data security and privacy driven, working diligently to ensure our services and team members are dedicated to ensuring compliance with best in class regulatory and industry frameworks to make sure that your data is protected. Poppulo utilizes a combination of enterprise class security features and comprehensive assessments of our applications, systems, and networks, maintaining the highest standards of data protection.

Our global privacy and data protection program includes cross functional key stakeholders comprised of our legal, security, product and executive teams. Poppulo’s security framework is based on the ISO 27001 Information Security Management System and the SOC 2 Type 2 Trust Service Principles of Security, Confidentiality, Availability and Privacy, including programs covering: Policies and Procedures, Asset Management, Access Management, Cryptography, Physical Security, Operational Controls, Business Continuity, Disaster Recovery, Product Security, Cloud and Network Infrastructure, Vendor Management, Vulnerability Assessments, and Incident Response. Security is managed at the highest levels of the company and is paramount to the services we provide.

mercedes-benz
zurich
marriott
hershey's
aerlingus
wipro
pennstate
boston scientific

50 million

Employees Reached

40+

of Fortune 100 Companies

500,000+

Digital Signs Powered

50 million

Messages/Week

Compliance Certifications and Memberships

mercedes-benz
zurich
marriott
hershey's
aerlingus
wipro

Artifacts

ISO certificate
Licensing documents
Pentests and resolution docs

Please speak with a Poppulo representative for this documentation.

SOC2 Type II

Please speak with a Poppulo representative for this documentation.

Redacted Policies

Please speak with a Poppulo representative for this documentation.

Certificate of Insurance

Please speak with a Poppulo representative for this documentation.

Security Whitepaper

Please speak with a Poppulo representative for this documentation.

Cloud Security

Facilities

Poppulo hosts data at co-located data centers as well as AWS and Azure data centers depending upon the solution. These datacenters have been certified in ISO27001, and/or are SSAE16 (SOC 1 & 2) compliant. Learn more about AWS physical controls here: https://aws.amazon.com/compliance/data-center/controls/ and about Azure physical controls here: https://learn.microsoft.com/en-us/azure/security/fundamentals/physical-security

On-site security

Data center security includes onsite 24/7 security staff and monitoring, fencing, badge requirements, and other physical security measures. Learn more about AWS physical controls here: https://aws.amazon.com/compliance/data-center/controls/ and about Azure physical controls here: https://learn.microsoft.com/en-us/azure/security/fundamentals/physical-security

Data hosting location

Poppulo leverages datacenters in the NA(North America), EMEA(Europe, the Middle East and Africa), and AP(Asia Pacific) regions. Data is not replicated between regions and data storage is isolated to a given jurisdiction based on customer preferences. More information can be found in the Trust portal here(Whistic).

Vendor Security

Security reviews are conducted on all vendors with any access to our service or systems data to minimize security risk.

Dedicated Security Team

Poppulo has a dedicated security team ensuring security risk is minimized across the organization.

Protection

Poppulo's networks are protected through the use of AWS security services, advanced firewalls, load balancers, regular audits of all services, and network intelligence technologies that monitor network traffic for malicious traffic.

Architecture

Poppulo's networks consist of multiple zones in which different levels of security apply. All traffic between zones is encrypted and each zone has appropriate controls applied commensurate with the type of data processed and risk. Network monitoring and access controls apply to all zones.

Network Vuln Scanning

Poppulo scans internally and externally for network vulnerabilities through the use of network scanning tools for expedient discovery of vulnerable and non-compliant systems in our networks.

Third-party Pentests

As an addition to Poppulo's regular vulnerability scanning, we employ an industry recognized security vendor to conduct a penetration test of our networks annually.

Security Incident Event Management

A Security Incident Event Management (SIEM) system is utilized to gather comprehensive logs from production network resources and hosts. These logs are consolidated in one platform for advanced analysis and threat notification/response.

Intrusion Detection and Prevention

Poppulo leverages IDS/IPS internally in addition to host based protections through our datacenter environments. This includes 24/7 Endpoint Detection and Response (EDR).

Threat intelligence Program

Poppulo follows industry best practices including OWASP top 10 in keeping our security controls up to date. Security professionals stay current with possible threats to our environment through research, threat notifications, and provided training.

DDoS Mitigation

Poppulo leverages automated defenses as well as load balancers and AWS scaling and protection tools to mitigate DDoS attacks.

Logical Access

Access to Poppulo environments is managed through the principles of least privilege and need-to-know. Remote access to Poppulo networks requires multi factor authentication. Access is monitored and controlled by the appropriate resource owners, with audits conducted at regular intervals.

Security Incident Response

Poppulo deploys robust monitoring and logging practices for our environment. In the event that an alert is generated for a potential/actual incident, the incident response team consisting of members from the cloud, network, and security teams is mustered immediately to assess the alert.

Encryption in transit

Poppulo encrypts all data in transit using TLS 1.2 (or higher) over HTTPS by default. This includes encryption of emails to ensure the mitigation of Man in the Middle attacks. Exceptions may include Legacy services such as older versions of digital signage software.

Encryption at rest

Poppulo encrypts all data at rest using AES 256 by default.

Uptime

Poppulo maintains several system-status websites that can be reviewed for system availability, scheduled maintenance, and service incident history. www.poppulo.com/status http://stats.pingdom.com/s8rlafb4kmnh

Redundancy

Poppulo employs redundant networks and load balancers to ensure there is not a single point of failure. A robust Disaster Recovery Policy is also in place ensuring high availability.

Disaster Recovery

Poppulo has a robust disaster recovery program that ensures recovery of services from disruptions such as hardware failure, natural disasters, and other unforeseen catastrophes.

Recovery objectives

Poppulo commits to a Recovery Time Objective of 4 hours and a Recovery Point Objective of 24 hours.

Application Security

Secure Code training

Poppulo ensures development team members are trained on secure coding, OWASP Top 10, and code security expectations.

Framework Security Controls

Modern open-source frameworks with built-in security controls protect against OWASP top 10 threats and more.

Quality Assurance

Dedicated QA teams leverage peer reviews and automation to uphold code quality.

Separate environments

Production, Staging, Development, and Corporate environments are isolated on separate networks to avoid cross-access.

Dynamic application security testing

Third-party tools run DAST scans targeting OWASP Top 10 and attacks like CSRF.

Static application security testing

SAST is conducted both manually and automatically using third-party tools.

Third-party Pentests

Annual automated and manual penetration tests are performed by recognized vendors.

Software composition analysis

SCA scanning is conducted on all software components during development using third-party tools.

Product Security

SSO Capability

Supports customer integration with SAML2.0-based SSO or Okta depending on product.

YubiKey MFA

MFA using YubiKey is supported when SSO is not available.

Role-based access controls

Applications support granular RBAC including Admin, Author, Contributor, and Viewer roles for email and digital signage.

File scanning when uploaded

All uploads in the email and feeds apps are scanned for malware.

IP restrictions

Supports IP whitelisting for enhanced access control to customer accounts.

DKIM/DMARC

Supports configuration of DKIM, SPF, and DMARC policies for email delivery protection.

HR Security

Policies

Poppulo maintains comprehensive InfoSec policies reviewed annually and audited for ISO 27001 and SOC2 compliance. All employees are required to review and agree to these during onboarding and annually.

Training

All employees undergo security awareness training during onboarding and annually. Developers receive quarterly training, and phishing tests and updates are conducted year-round.

Background Checks

Thorough background checks are conducted for all employees in compliance with applicable law to ensure suitability for employment.

Confidentiality agreements

Employees must agree to confidentiality terms before accessing sensitive data. Similar terms are included in vendor and customer contracts.

Privacy

Privacy frequently asked questions
Subprocessors
Privacy Policy

Get ready to transform your enterprise.

TALK TO AN EXPERT