{"id":5277,"date":"2024-02-21T06:45:00","date_gmt":"2024-02-21T11:45:00","guid":{"rendered":"https:\/\/clariowebstg.wpengine.com\/?page_id=5277"},"modified":"2025-06-26T16:32:00","modified_gmt":"2025-06-26T20:32:00","slug":"information-security","status":"publish","type":"page","link":"https:\/\/clario.com\/about\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div class=\"clario-section\">\n  <div class=\"container\">\n      \n\n<h3 class=\"wp-block-heading\" id=\"h-table-of-contents\">Table of Contents<\/h3>\n\n\n\n<ol class=\"wp-block-list mb-3\">\n<li><a href=\"#information-security-team\">Information Security Team<\/a><\/li>\n\n\n\n<li><a href=\"#information-security-governance-risk-and-compliance-program\">Information Security Governance, Risk, and Compliance Program<\/a><\/li>\n\n\n\n<li><a href=\"#infrastructure-amp-data-centers\">Infrastructure and Data Centers<\/a><\/li>\n\n\n\n<li><a href=\"#encryption\">Encryption<\/a><\/li>\n\n\n\n<li><a href=\"#security-audits\">Security Audits<\/a><\/li>\n\n\n\n<li><a href=\"#access-control\">Access Control<\/a><\/li>\n\n\n\n<li><a href=\"#security-incident-monitoring-management-and-reporting\">Security Incident Monitoring, Management and Reporting<\/a><\/li>\n\n\n\n<li><a href=\"#data-privacy\">Data Privacy<\/a><\/li>\n\n\n\n<li><a href=\"#penetration-testing-and-vulnerability-scanning\">Penetration and Vulnerability Scanning<\/a><\/li>\n\n\n\n<li><a href=\"#security-updates\">Security Updates<\/a><\/li>\n\n\n\n<li><a href=\"#personnel-security\">Personnel Security<\/a><\/li>\n\n\n\n<li><a href=\"#product-security\">Product Security<\/a><\/li>\n\n\n\n<li><a href=\"#backup\">Backup<\/a><\/li>\n<\/ol>\n\n\n<div class=\"row\">\n\t\n\n<div class=\"col-12 col-md-9\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\" id=\"information-security-team\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">1.<\/mark> Information Security team<\/h3>\n\n\n\n<p>The Information Security team is accountable for enhancing, operating, and continually refining Clario&#8217;s information security to uphold the availability, confidentiality, and integrity of its data. Leading this effort is our Chief Information Security Officer (CISO), who holds a crucial role in shaping Clario&#8217;s security strategy. Collaborating with the CISO are dedicated and resolute teams within specialized domains, each headed by key leaders. Under the CISO&#8217;s guidance, the Information Security function receives additional sponsorship from the Chief Information and Technology Officer (CITO), offering robust support and oversight.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"information-security-governance-risk-and-compliance-program\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">2.<\/mark> Information Security Governance, Risk, and Compliance Program<\/h3>\n\n\n\n<p>Clario has an Information Security Technology Governance, Risk, and Compliance (GRC) Program that establishes a comprehensive governance structure, manages risk, and ensures compliance with regulatory and industry standards.<\/p>\n\n\n\n<p>As of February 2025, Clario has achieved both the <strong>ISO 27001:2022 certification<\/strong> and <strong>SOC 2 Type II attestation<\/strong>.<\/p>\n\n\n<div class=\"row mb-1\">\n\t\n\n<div class=\"col-6 col-md-3\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/02\/Clario-1368537-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"50\" src=\"https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/iso27001_seal_blue_webversion_150x50px_png.png\" alt=\"\" class=\"wp-image-11390\"\/><\/a><\/figure><\/div>\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-6 col-md-3\">\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/06\/Clario-2024-SOC-2-Type-2-Report-External.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"359\" height=\"357\" src=\"https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/21972-312_SOC_NonCPA.png\" alt=\"\" class=\"wp-image-11391\" style=\"width:107px;height:auto\" srcset=\"https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/21972-312_SOC_NonCPA.png 359w, https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/21972-312_SOC_NonCPA-250x250.png 250w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/><\/a><\/figure><\/div>\n\t<\/div>\n\n<\/div>\n\n\n\n<p>ISO\/IEC 27001:2022 is a globally recognized standard that lays out the framework for an Information Security Management System (ISMS). ISO 27001:2022 is designed to ensure the confidentiality, integrity, and availability of information assets, as well as manage the associated risks. Achieving ISO\/IEC 27001:2022 certification involves a comprehensive evaluation of our security practices and policies, followed by meticulous audits by an independent expert.<\/p>\n\n\n\n<p><strong>What this means for you: <\/strong><\/p>\n\n\n\n<p>The ISO\/IEC 27001:2022 certification underscores our dedication to securing your data and maintaining the trust you place in us. Our commitment to ISO 27001:2022 demonstrates our proactive approach to identifying and mitigating security risks that could affect your information.<\/p>\n\n\n\n<p>Service Organization Control 2 (SOC 2 Type II) compliance is an evaluation of our controls over security, and availability of customer data. The SOC 2 report is a testament to our commitment to providing secure and reliable services to our clients.<\/p>\n\n\n\n<p>Our SOC 2 compliance assures you that the security controls we have in place have been rigorously assessed and meet the highest industry standards.<\/p>\n\n\n\n<p>We understand that transparency is key. SOC 2 compliance enables you to make informed decisions about entrusting us with your valuable data.<\/p>\n\n\n\n<p class=\"has-medium-font-size\"><a href=\"#documents\"><strong>Access the documentation here<\/strong><\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"infrastructure-amp-data-centers\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">3.<\/mark> Infrastructure and data centers<\/h3>\n\n\n\n<p>Clario&#8217;s products are hosted with some of the largest data center and cloud hosting providers. Access to these data centers is strictly controlled and monitored by 24x7x365 with onsite security staff, biometric scanning, and video surveillance. Our hosting service providers and data center vendors maintain multiple certifications for their data centers, including ISO 27001:2022, PCI DSS, Cloud Security Alliance Controls, and SOC reports. Formal audits on each of our infrastructure providers are undertaken. Clario uses a combination of clustering, load-balancing, and replication to ensure there are no single failure points in the system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"encryption\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">4.<\/mark> Encryption<\/h3>\n\n\n\n<p>Clario employs strong encryption protocols to secure data during transmission and storage. Our encryption methods ensure that sensitive information remains confidential and protected from unauthorized access. Customer data is isolated and maintained separately from corporate data, requiring additional authentication and authorization to access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"security-audits\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">5.<\/mark> Security audits<\/h3>\n\n\n\n<p>Clario performs internal assessments and also engages third-party security experts to perform assessments and audits of our systems. This ensures an unbiased evaluation of our security measures and helps us identify areas for improvement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"access-control\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">6.<\/mark> Access control<\/h3>\n\n\n\n<p>Clario uses access mechanisms to restrict access to account and data only to authorized personnel. Multi-factor authentication adds an extra layer of security to prevent unauthorized account access, adding an extra layer of security beyond passwords.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"security-incident-monitoring-management-and-reporting\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">7.<\/mark> Security incident monitoring, management and reporting<\/h3>\n\n\n\n<p>Clario has 24x7x365 security monitoring and an incident management and reporting process in place that enables unified security monitoring and protection across our environments. Our Security Information and Event Management (SIEM) platform uses a centralized logging system which ingests logs from across our infrastructure including network sensors, network appliances, servers, devices, and email.&nbsp;In the event of a security incident, we have established incident response procedures to minimize the impact and quickly restore normal operations. Our team is well-prepared to oversee incidents and communicate transparently with our stakeholders if necessary. Clario tests the effectiveness of incident response procedures through activities such as table-top exercises.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"data-privacy\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">8.<\/mark> Data privacy<\/h3>\n\n\n\n<p>Clario adheres to applicable data protection regulations to safeguard personal data and is ISO\/IEC 27701:2019 (ISO 27701) certified. For more information about our Data Privacy Program, visit our <a href=\"https:\/\/clario.com\/about\/legal-and-privacy\/\">Legal and Privacy page.<\/a><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"penetration-testing-and-vulnerability-scanning\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">9.<\/mark> Penetration testing and vulnerability scanning<\/h3>\n\n\n\n<p>Clario conducts regular vulnerability scans across the network. Additionally, we perform penetration testing through a combination of our in-house security team and qualified third-party penetration testers no less than annually.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"security-updates\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">10.<\/mark> Security updates<\/h3>\n\n\n\n<p>Our team works proactively to address any potential threats and enhance our security measures. As part of Clario\u2019s overall Information Security Program, we have created a formal Patch Management Policy that is approved by management and communicated to the appropriate support teams. We regularly update our systems, software, and applications to patch any known security vulnerabilities. This proactive approach helps us stay ahead of potential threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"personnel-security\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">11.<\/mark> Personnel security<\/h3>\n\n\n\n<p>Clario has created a culture where security is everyone\u2019s responsibility, and all employees are encouraged to help secure our data and assets. Our employees go through background screening prior to onboarding. Additionally, all Clario employees undergo regular security and privacy awareness trainings and exercises. Phishing tests are administered quarterly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"product-security\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">12.<\/mark> Product security<\/h3>\n\n\n\n<p>Security is an integral part of our products at Clario.&nbsp;Product security is built into every facet of the Software Development Lifecycle, from design to operationalization.&nbsp;Vulnerabilities are discovered and remediated through diligent design reviews, automated and manual testing, establishing robust metrics and baselines, driving continuous improvement, and ensuring secure policies through governance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"backup\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-pink-color\">13.<\/mark> Backup<\/h3>\n\n\n\n<p>Clario runs scheduled backups of files, databases, configurations, and servers, consisting of incremental, differential, and full. backups. Backups are encrypted and are stored offsite in a separate physical location. Complete media recovery tests are performed periodically from a randomly selected offsite backup. A formal network-wide Disaster Recovery Plan (DRP) is in place.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n  <\/div>\n<\/div>\n\n\n<div class=\"clario-section light-grey-50\">\n  <div class=\"container\">\n      \n<div class=\"row mb-3\">\n\t\n\n<div class=\"col-12 col-md-9\">\n\t\t\t\n\n<h2 class=\"wp-block-heading\" id=\"h-get-the-answers-you-need\">Get the answers you need<\/h2>\n\n\n\n<p>Clario maintains up-to-date security documentation, certifications, and answers to commonly asked questions.<\/p>\n\n\t<\/div>\n\n<\/div>\n\n\n<div class=\"row\">\n\t\n\n<div class=\"col-12 col-md-6 mb-3 mb-md-0\">\n\t\t\t\n\n<h3 class=\"wp-block-heading\" id=\"h-badges\">Badges<\/h3>\n\n\n<div class=\"row align-items-center\">\n\t\n\n<div class=\"col-6 col-md-4\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-center\">\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/02\/Clario-1368537-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"50\" src=\"https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/iso27001_seal_blue_webversion_150x50px_png.png\" alt=\"\" class=\"wp-image-11390\" style=\"object-fit:contain;width:170px;height:170px\"\/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/02\/Clario-1368537-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001:2022<\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"col-6 col-md-4\">\n\t\t\t<div class=\"h-100 d-flex flex-column justify-content-start\">\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/02\/Clario-2024-SOC-2-Type-2-Report-Eexternal.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"359\" height=\"357\" src=\"https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/21972-312_SOC_NonCPA.png\" alt=\"\" class=\"wp-image-11391\" style=\"object-fit:contain;width:121px;height:165px\" srcset=\"https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/21972-312_SOC_NonCPA.png 359w, https:\/\/clario.com\/wp-content\/uploads\/2024\/02\/21972-312_SOC_NonCPA-250x250.png 250w\" sizes=\"auto, (max-width: 359px) 100vw, 359px\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/06\/Clario-2024-SOC-2-Type-2-Report-External.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">SOC 2 Type II<\/a><\/p>\n\n\t\t<\/div>\n\t<\/div>\n\n<\/div>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-6\">\n\t\t\t\n\n<h3 class=\"wp-block-heading mb-2\" id=\"documents\">Documents<\/h3>\n\n\n\n<h4 class=\"wp-block-heading mb-0\" id=\"h-audit-and-compliance\">Audit and Compliance<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/clario.com\/wp-content\/uploads\/2025\/02\/Clario-1368537-2.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">ISO\/IEC 27001:2022<\/a><\/li>\n\n\n\n<li>Auditor&#8217;s Directory: <br><a href=\"https:\/\/www.schellman.com\/certificate-directory\" target=\"_blank\" rel=\"noreferrer noopener\">ISO Certificate Directory | Schellman<\/a><\/li>\n<\/ul>\n\n\t<\/div>\n\n<\/div>\n\n  <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p> [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/clario.com\/about\/information-security\/\">Read More&#8230;<span class=\"screen-reader-text\"> from Information Security<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":2633,"parent":151,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5277","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/pages\/5277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/comments?post=5277"}],"version-history":[{"count":0,"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/pages\/5277\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/pages\/151"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/media\/2633"}],"wp:attachment":[{"href":"https:\/\/clario.com\/wp-json\/wp\/v2\/media?parent=5277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}