SmithRX's Security Protocols
SmithRX implements a robust set of security protocols to ensure the protection of customer data. Key features include:
Our Security Protocols
Data Protection
AES 256 Encryption
Used for data at rest and in transit
SOC2 Hosting
Ensures compliance with industry standards
Access Management
Role-Based Access Control (RBAC)
Access is granted based on job roles and the principle of least privilege
Unique User IDs and Strong Passwords
Required for all users
Enforced Device Posture
We validate the security posture of all systems connecting to SmithRX resources
Documented Access Requests
Access requires management approval and documented requests
Multi-Factor Authentication (MFA)
Mandatory for remote access
Authentication & Authorization
Single Sign-On (SSO)
Streamlines user authentication
Password Policies
Defined to enforce strong security measures
Device Management
Endpoint Security
Agents are deployed on every system that Smith provisions; all endpoints are centrally managed by IT
Full Disk Encryption
All endpoints have full disk encryption and remote wipe capabilities enabled
Audit & Monitoring
Audit Logging
Tracks user activities for accountability
Anomaly Detection
Monitors for unusual activities
User Training
Security Awareness Training
Required for users before access is granted
Report a Security Vulnerability
These protocols collectively ensure that customer data is securely segmented and protected from unauthorized access. Help us maintain the highest security standards. If you've identified a potential security vulnerability, please report it using this form.