Endpoint Protection
ConnectWise endpoints are equipped with a cloud-based, next-generation threat protection platform leveraging execution profiling and predictive security analytics as well as malware signatures, indicators of compromise, exploits, and vulnerabilities.
Vulnerability Management
ConnectWise regularly scans systems and networks for vulnerabilities. All findings are reviewed, prioritized based on severity, and assigned to the appropriate team for remediation. ConnectWise also regularly commissions vulnerability assessments, phishing assessments, and penetration tests through trusted third-party providers.
ConnectWise also has a process for addressing zero-day vulnerabilities that includes threat intelligence for visibility, scanning for assessment of threat, and emergency escalation provisions for remediation.
Patch Management
ConnectWise strives to apply the latest security patches and updates to operating systems, applications, and network infrastructure to mitigate exposure to vulnerabilities. Patch management processes are in place to implement security patch updates as they are released by vendors. Patches are tested prior to being deployed into production.
Logical Access Controls
Role-based access is utilized in all information systems. Entitlements are defined based upon least privilege and segregation of duties. Processes and procedures are in place to govern access provisioning, access termination (voluntary and involuntary), and periodic entitlement reviews. Privileged access is further controlled by segregation of account IDs, security notifications of privileged account usage, and time-bound access.
All users are provisioned with unique account IDs. Password requirements enforce the use of complex passwords as well as password rotation to protect against unauthorized use of passwords. Passwords are individually salted and hashed. Further, all employees have multifactor authentication (MFA) enabled and enforced on their accounts.
ConnectWise employees are granted a limited set of default permissions to access company resources, such as their email and the corporate intranet. Employees are granted access to certain additional resources based on their specific job function. Requests for additional access follow a formal process that involves a request and an approval from a data or system owner, manager, or other executives, as defined by our security guidelines. Approvals are managed by workflow tools that maintain audit records of changes.
Application Security
We follow a defined methodology for developing software that is designed to increase the resiliency and trustworthiness of our products. Our software development methodology is based on a security/privacy-by-design approach. Security and security testing are implemented throughout the entire software development methodology. Quality assurance is involved at each phase of the lifecycle and security best practices are a mandated aspect of all development activities.
Our secure development lifecycle includes standard security practices such as vulnerability testing, regression testing, penetration testing, and product security assessments. The ConnectWise architecture review board review is responsible for reviewing all major changes to our products as well as changes to our engineering approach and methodology.
Incident Management
ConnectWise has a formalized incident response plan and associated procedures in case of an Information Security incident. The Incident Response Plan defines the responsibilities of key personnel and identifies processes and procedures for notification. Incident response personnel are trained, and execution of the incident response plan is tested periodically.
An incident response team is responsible for providing an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
Business Continuity and Disaster Recovery
To minimize service interruption due to technology failure, natural disaster, or other catastrophe, we have implemented data backup and disaster recovery programs across all cloud environments. These programs include multiple components to minimize the risk of any single point of failure. Access and encryption controls are established to safeguard data back-ups. All recovery and data restoration plans are tested and updated regularly.
Data Protection
We apply a common set of data management principles to partner and customer data that we may process, handle, and store. We protect all data using appropriate physical, technical, and organizational security measures.
ConnectWise only processes personal information in a way that is compatible with and relevant for the purpose for which it was collected or authorized by consent in accordance with our privacy policy.