We are transforming R&D by providing innovation intelligence, and our success relies on our ability to provide you with a safe and trustworthy place for you to research, analyze, collaborate and develop insights for future opportunities. We are relentless in our efforts to protect your data.

A Relationship Built on Trust

  • Our employees are the backbone of our ability to provide a world class service. Each employee undergoes extensive training and background checks prior to being extended an offer.

  • All systems are highly available and we strive to deliver 99.99% up time.

  • All our customer data is 100% backed up and replicated for contingency.

  • A 24/7/365 DevOps team monitor the platform and application behavior.

  • Customer alerts. If there’s ever a customer-impacting situation, we’ll make you aware of it immediately.

Product & Application Security

Sessions between you and your Analytics portal sessions are always protected with top end in-transit encryption. We allow both http and https connection to our website and we will soon enforce only SSL v3 connection (https).

Our firewall technologies monitor and block attacks before they reach the front door.

We deploy a web application firewall (WAF) on Amazon Web Services (AWS) and perform daily checks on any anomalies.

Distributed Denial of Service (DDoS) services protect our site from attacks designed to keep you out. Our service is built on the AWS cloud, providing the following globally distributed, high bandwidth network solutions to mitigate any risk of DDoS attacks:

ROUTE 53

“One of the most common targets of DDoS attacks is the Domain Name System (DNS). Amazon Route 53 is a highly available and scalable DNS service designed to route end users to infrastructure running inside or outside of AWS. Route 53 makes it possible to manage traf c globally through a variety of routing types, and provides out-of-the-box shuffle sharding and Anycast routing capabilities to protect domain names from DNS-based DDoS attacks.”

CLOUDFRONT

“Amazon CloudFront distributes traf c across multiple Points of Presence (PoP) locations and lters requests to ensure that only valid HTTP(S) requests will be forwarded to back end hosts. CloudFront also supports geo restriction, also known as geo-blocking, which can be useful for isolating attacks originating from a particular geographic location.”

WAF

”AWS WAF is a web application firewall that helps protect web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. Using AWS WAF, customers can de ne customizable web security rules that control which traf c accesses their web applications. Web security rules that target specific DDoS request patterns can be very effective for minimizing the effect of a DDoS attack.“

ELASTIC LOAD BALANCING

“Elastic Load Balancing (ELB) enables the automatic distribution of application traffic to several Amazon Elastic Compute Cloud (Amazon EC2) instances across multiple Availability Zones, which minimizes the risk of overloading a single EC2 instance. Elastic Load Balancing, like CloudFront, only supports valid TCP requests, so DDoS attacks such as UDP and SYN floods are not able to reach EC2 instances. It also offers a single point of management and can

serve as a line of defense between the Internet and your back end, private EC2 instances.”

VPCS AND SECURITY GROUPS

“Amazon Virtual Private Cloud (Amazon VPC) allows customers to configure subnet routes, public IP addresses, security groups, and network access control lists in order to minimize application attack surfaces. ELB load balancers and EC2 instance security groups can be configured to allow only traffic that originates from specific IP addresses, such as that from CloudFront or AWS WAF, protecting back end application components from a direct attack.”

We log everything. Advanced logging is embedded across our analytics platform, providing instantaneous and consistent anomaly alerting. We have built an extensive dedicated log system backed by automated analysis. Any error or warning is escalated automatically
for root cause analysis.

Infrastructure & Data Center Security

PatSnap is hosted with the world’s leading cloud providers whose data centers are strictly controlled and monitored by 24x7 on-site security staff, biometric scanning and video surveillance. Our data center partners are SOC 2 Type II and ISO 27001 certified and provide N+1 redundancy to all power, network, and HVAC services. AWS cloud infrastructure requires the following access to its highly secured data center.

“Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance,intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access data center oors”

All of our databases, application servers, web servers, jobs servers, and load balancers as well as back end support services all have multiple fail over instances to prevent outage from single points of failure.

PatSnap’s rapid patch management process pushes all the latest security updates fast. Patching is generally handled by deploying new container instances with the most up to date.

Constant State of Improvement

PatSnap regularly invites third party penetration testing firms to keep us guessing and improving our practices.