We employ rigorous measures across our people, processes, and technology
to safeguard your data, applications, and infrastructure.
Stello applications are hosted in data centers with fully redundant subsystems and compartmentalized security zones. We use AWS EC2 and Amazon RDS (Relational Database).
Our application development, testing, and deployment process is rooted in a firm commitment to product security. Our Product and Technology teams follow a framework called Secure Software Development Life Cycle (SSDLC).
Stello utilizes Cloudflare Network Services to identify and block attacks targeted at exploiting web application vulnerabilities. Ensures a robust network security framework, securing the Stello environment from evolving threats.
Software architecture model that allows a single application to serve multiple customers, or tenants. Multitenancy uses a architecture that follows the "data isolation" principle. It keeps each tenant's data separate and invisible to other tenants. Each tenant has their own data access, permissions, and privileges.
We leverage state-of-the-art encryption technologies to secure customer data, regardless of whether it’s at rest or in transit.
Authentication & Single sign-on: Stello seamlessly integrates with internal customer web portals via Auth0 and SAML, creating an effortless single-sign-on experience. For those utilizing Microsoft Azure AD, Stello provides an Azure Active Directory connector.
Engaging third parties to perform network vulnerability assessments and penetration testing on a regular basis. Specific Testing Methodologies used are:
Regularly testing the key controls and systems to validate that they are properly implemented and effective in addressing the threats and risks identified. Where applicable, such testing includes