Security & Compliance Regulations

Security & Compliance Built on Trust. Genea Access Control and Visitor Management customers at more than 1,800 sites across 24 countries trust Genea with their security. With up-to-date data security, we have helped everyone from startups to Fortune 50 enterprises succeed in keeping their information safe in an ever-changing world of security. See what we can do for you.

System & Organization Controls

SOC 2 is a set of security controls created by The American Institute of Certified Public Accountants (AICPA). Genea has achieved compliance, meaning your data is stays safe and secure. For customers that would like a copy of our SOC2 Type II report, please contact us.

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) governs data protection and privacy for all individuals and citizens of the European Union (EU) and European Economic Area. Genea complies with GDPR, Penetration Testing is also performed regularly. Through this testing, Genea scrupulously evaluates its IT infrastructure by safely exploiting its vulnerabilities.

California Consumer Protection Act (CCPA)

The CCPA is California’s version of the GDPR implemented in the European Union (see above).  Genea follows CCPA regulations, so consumers know how their data is collected, used and stored.

Underwriter Laboratories (UL)

Underwriter Laboratories is a safety organization that sets industry-wide standards on new products and continually checks these products to ensure compliance. The UL-listed icon signifies thorough testing of a product against safety standards, including fire and electric shock. To view all hardware with the UL certification, visit the UL Product IQ website.

Security Features & Processes

Security Features & Processes

Network Segmentation & Role-Based Access Control

To improve cybersecurity, Genea employs strict network segmentation and isolation of environments and services in place. We use Separation of Environments, Network Segregation, Segregation of Duties and strict role-based access control on a documented, authorized and need-to-use basis. We use key management services to limit access to information.

Data in Transit

Genea makes sure all communication between their software and servers stays protected. The security uses 256-bit-encrypted HTTPS protocol — TLS (Transport Layer Security) 1.2 and above. Anyone or anything, including a supercomputer that attempts to pry, may take years to crack the decryption combination.

Data in Rest

Genea use AWS encrypted database instances and backups which are encrypted using industry standard AES-256 bit encryption at rest.

SAML-Based SSO

Authenticate with and access Genea applications with SAML 2.0 compliant, single sign-on (SSO).

Two-Factor Authentication

Configure two-factor authentication to add an extra layer of security used to make sure that people trying to gain access to an account are who they say they are.

Cloud Infrastructure

Our infrastructure incorporates best practices from the Amazon Web Services (AWS) Adoption Framework, giving you optimal security.

Host Security

Genea’s host security includes industry-leading anti-virus, anti-malware, intrusion prevention systems and intrusion detection systems.

Vulnerability Assessment & Penetration Testing

Genea selects an external vendor to target the assets of our software which are visible on the internet.  The external assessor inspects the entire software using various techniques such as cross-site scripting, SQL injection and backdoors etc. Genea also employs an in-house network security team who run manual and automated vulnerability assessment and penetration tests time to time to ensure that we follow the OWSP top10. Our networks are continuously being monitored by industry leading products.

Incident & Change Management

Genea has an aggressive stance on Incident Management when it comes to system downtime and Security and Network Operations. We have an Information Security Management System that quickly reacts, remediates or escalates any incidents arising out of planned or unplanned changes.