top of page
Accredo V6 Page Banner  (780 × 400 px) (4)_edited.jpg

EDI SECURITY WITH EDIStech

EDIStech handles confidential business information for enterprise companies, ensuring the protection of their data and systems, which our customers depend on.

​

Rest assured that our web apps utilize encrypted communication and industry-standard authentication. We ensure secure data exchange through SSH tunnels and SSL/TLS encryption, and our integrations only use the minimum required permissions.

​

Our servers are hosted in Azure, providing secure physical and virtual environments. EDIStech operates with security-segregated subnets and firewalls to restrict network access. We conduct frequent penetration tests and regular security updates to maintain the highest level of security.

Our Approach

​​

  • Staff Training and Policies: Every team member is thoroughly trained on data security protocols, and we enforce strict policies to safeguard your information.

  • Monitoring and Alerts: We actively monitor application, system, and data access logs for any unusual activities, with real-time alerts triggered by irregularities.

  • Background Checks: All employees are subject to thorough background checks to ensure security and trustworthiness.

  • Security Policy: Our detailed security policy defines our procedures for incident management, including prompt customer notifications in the event of a confirmed breach.

  • Encryption: All passwords and access tokens are securely encrypted to protect sensitive information.
     

Shared Commitment​


Although we maintain strict security standards and adhere to regulations, you are an equally important part in safeguarding your data. Our customers interact with multiple organizations, each accountable for securing their own data.

​

Emergency Management

​

We have incident response policies and procedures to address service availability, integrity, security, privacy, and confidentiality issues. Our trained teams are prepared to:

  • Quickly react to potential incident alerts

  • Evaluate the severity of the incident

  • Analyze and assess the extent of the incident

  • Implement mitigation and containment actions, if required

  • Communicate with both internal and external stakeholders, including notifying affected customers in compliance with legal and contractual obligations

  • Gather and preserve evidence for investigation

4K Resolution images (7).jpg
bottom of page