Security Practices


Data Storage Management

Dathena has opted for a single-tenant architecture where each client has its own database and processing environment, this approach guarantees data integrity and maximum security.

Data Encryption In Transit and At Rest

Dathena services support the latest recommended secured protocols to encrypt all traffic in transit with the different data sources supported. Customer Data is encrypted at rest.

Host Management

We perform automated vulnerability scans on our production hosts and remediate any findings that present a risk to our environment. We enforce screens lockouts and the usage of full disk encryption for company laptops.

Personnel Practices

Dathena employees receive privacy and security training during onboarding as well as on an ongoing basis. All employees are required to read and sign our information security policy covering the security and confidentiality of the Dathena services.

Access Management

Strict security processes are in place to rule access management. All requests are registered, and accesses are granted by our internal infrastructure and IT team. Some operations of the Dathena services requires that some employees have access to the systems which store and process Customer Data (to diagnose a problem while you are using Dathena services). These employees are prohibited from using these permissions to view Customer Data unless it is necessary to do so.