Security
At Manhattan, security is integral to our products, services, and our business processes. We utilize industry-leading security tools, technologies, and procedures to monitor and protect the solutions we provide for our customers.
Our approach enables us to provide comprehensive data protection and privacy programs to protect customer information. Defined security strategies enable us to stay current with security protections and operate robust governance and risk management programs.
Using a combination of effective technologies and business practices allows us to enhance our organization’s cyber defenses.
Data Security
We recognize that data is comprised of valuable assets and we are committed to protecting customer information within our services.
Our dedicated cybersecurity teams manage industry-standard security controls and monitoring activities designed to protect customer data and strengthen company operations. Documented incident response procedures and our 24/7 security operations team are in place to facilitate the timely response to any security incident.
We utilize multiple methods of protecting customer data from cyber-attacks and other fraudulent intrusions include, but not limited to:
- Data Encryption Protocols
- Information Protection Programs
- Data Retention Programs
- Data Processing Agreements
- Continual Security Training including OWASP & Phishing Exercises
- Third-Party Security Penetration Testing
- Third-Party Risk Assessments
- 24x7 Monitoring, Alerting, & Response
Shared Responsibility
Responsibility for protecting environments and information used to deliver and operate Manhattan solutions is a shared responsibility. Manhattan and the customer are required to exercise strong cybersecurity best practices to ensure the safety of these critical assets.
We are committed to doing our part to help our clients defend against cyber-attacks.
Report a Security Vulnerability
Manhattan is committed to the security of our products and data. We maintain a Vulnerability Disclosure Program which security researchers may use to report any potential vulnerability within our products. Researchers are invited to report any potential vulnerabilities discovered within our products here.