HOTEL EFFECTIVENESS SECURITY AND COMPLIANCE

APPLICATIONS THAT ARE SECURE AND RELIABLE

Trusted By

aimbridge_logo
nationwide-l-1
wyndham-l
ihg-l
Remington%202020%20v2

KEEPING YOUR DATA SECURE

Hotel Effectiveness® is dedicated to providing you with applications that are secure, stable, and reliable.

We take extraordinary measures to ensure that our technology provides the best available safeguards against unwanted data access while maintaining high availability. We use industry best practices as well as the expertise of 3rd-party security companies to ensure we are always up to date with our security and practices.

INDUSTRY STANDARD CONTROLS & CERTIFICATIONS

PCI Compliance, SOC 1 Type II

SEPARATE ENVIRONMENTS

Our production environments are separate from our development and our quality assurance testing environments. We employ automated quality assurance testing before any code is placed into production.

DATA CENTERS

Hotel Effectiveness expands upon Amazon Web Services (AWS) as its cloud-hosting provider. Beyond using their default security provisions, Hotel Effectiveness uses Virtual Private Clouds (VPCs), which provide an isolated cloud environment within the AWS infrastructure. External network traffic to a VPC is managed via gateway, firewall, and intrusion detection rules, which are maintained in source code control to ensure that the configuration remains in compliance with Hotel Effectiveness security policies.

PROACTIVE SECURITY

Hotel Effectiveness periodically engages a security consulting firm to conduct risk assessments, aimed at identifying and prioritizing security vulnerabilities. The Information Security Committee coordinates remediation of the vulnerabilities. The security consulting firm also provides ongoing advice on current risks and on remediation of vulnerabilities and incident response.

REDUNDANCY

We built Hotel Effectiveness with disaster recovery in mind. Our applications and our data are spread across multiple AWS Availability Zones (data centers) and Regions to ensure our product will continue to work even if our main data center has an outage.

EXTERNAL MONITORING

Hotel Effectiveness uses 3rd-party intrusion detection systems in combination with multiple firewalls and application setting rules to ensure the utmost security around our system and your data. Our internal team is available 24/7 to monitor and react to any attempted intrusion.

PENETRATION TESTING

Hotel Effectiveness regularly engages security experts to perform detailed vulnerability testing on our applications and our infrastructure.

SOC 1 TYPE II

Every year, we have an independent auditing firm perform a SOC 1 Type II audit on our internal controls and procedures. This report is available to customers upon request.

ENCRYPTION

In Transit: Hotel Effectiveness encrypts all personal information in transit over public connections, using Transport Layer Security (TLS), commonly known as SSL, using industry-standard ciphers, algorithms, and key sizes.

At Rest: Hotel Effectiveness encrypts all data and information using industry-standard AES-256 encryption algorithm.

EMPLOYEES

We perform background checks on all new employees. All employees are required to sign a confidentiality agreement. In addition, all employees undergo Information Security Training.

INTEGRATIONS

We’re not a software vendor. We’re your partner in implementation. We offer dozens of direct connections to your critical software applications:

TIME & ATTENDANCE SYSTEMS

Save time and increase accuracy

Dynamic_Scheduling_white-New

BUSINESS INTELLIGENCE SOFTWARE

Get detailed, powerful insights

Benchmarking_White-New

PROPERTY MANAGEMENT SYSTEMS

Get better, more accurate forecast data

Corporate-Visibility_solid_white-New

PAYROLL SOFTWARE

Avoid rekeying information and prevent transcription errors

Automated_Monitoring_white-New
Security-Page-Testimonial

It’s a great solution, it’s very cost-effective and [they are] a great team to work with.

KEVIN RICHARDS

Chief Operating Officer
Legacy Ventures