Acceptable Use Policy
The wide array of resources, services, and interconnectivity available via the Internet all introduce risks.
Change Management Policy
Deploying changes, updates, and new software into production may, if not managed effectively, result in outages or other customer disruptions.
Corporate Security Executive Statement
Identifying and managing any developments that may threaten the resilience and continued survival of a corporation.
Data Classification and Handling
Accidental, unauthorized disclosure, theft, and dissemination are among the risks involved in handling sensitive information.
Disaster Recovery Plan
Disaster Recovery Plan (DRP) for use in the event of a disaster affecting the data centers or other computing facilities of Castle.
Network and Access Control Policy
Accessing and utilizing electronic resources creates risks associated with the methodologies used for such access.
Security Administration Manual
Administration and operations of security tasks is a key element in managing data security at Castle.
Security Incident Response Plan
Security incidents pose a risk to Castle’s business. Quick and effective handling of such incidents is an important factor in minimizing potential damage.
Security Incident Response Template
The following report is used to track a confirmed security incident.
Software Development Life Cycle (SDLC)
Process for planning, creating, testing, and deploying an information system.
Vendor Risk Management
Process for ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption.
- Bot Detection
- Account Takeover Prevention
- Policy Management
- Device Management
- User Behavior Analytics
- REST API & Webhooks
- Email & chat support
- Credit card payments
- Includes all Pro features
- Enterprise SLAs
- Enterprise support
- * Volume discounts available
- Customizable billing
- Invoice payments