Trust & Security

Your Data, Safe and Secure in the Cloud

ToolsGroup Puts Customers Firts — And That Means Safeguarding Customer Data With a Comprehensive, Multi-Layered Security Program in the ToolsGroup Cloud

In today's data-driven world, security is paramount.

At ToolsGroup, we understand the critical nature of protecting your information.

That's why we've implemented industry-leading security measures that ensure your data remains safe and secure in our cloud systems. This comprehensive overview outlines our commitment to data privacy and transparency. We detail our regulatory compliance, certifications, and supporting processes, all designed to safeguard your information with the utmost care. 

Service Resilience and Data Redundancy

Our cloud architecture inherently provides high availability for critical components, and we back this with a financially guaranteed Service Level Agreement (SLA). ToolsGroup has a documented disaster recovery plan that is tested regularly. In the event of a major outage affecting the primary environment, we can fail over to the secondary region to restore service quickly.

 

To safeguard availability, ToolsGroup employs robust service redundancy at multiple levels. Any data stored in our solution is kept in redundant copies within the primary hosting region, and it is also asynchronously replicated to a geographically separate secondary region. This geo-redundancy means that even if an entire data center region faces an outage, an up-to-date copy of your data remains available in the backup region, minimizing risk of data loss. The secondary region is carefully chosen to be an appropriate pair for the primary region, balancing distance as well as regulatory requirements.

Data Security and Privacy

Customer Data Ownership
Data Isolation
Full Encryption, Everywhere
Continuous Data Protection

ToolsGroup recognizes that your data is your property. The customer is the exclusive owner of all data put into our solution. We act as a steward of that data, processing and storing it only to fulfill our service obligations.

/ Data At Rest

All data stored on the Solution is encrypted using AES-256, with Keys controlled by ToolsGroup and separate for each Customer.

 

/ Data In Transit

All data in transit is protected using TLS, with a minimum key length for certificates of 4096-bit RSA.

Each customer’s environment is completely segregated at the application and database level. Your data is stored in its own dedicated database/schema and never co-mingled with anyone else’s data.

ToolsGroup employs strong encryption to protect customer data in all states: in transit, at rest, and in backups. All data transmitted to and from the application (for example, user traffic between your browser and our cloud) is encrypted in transit using TLS (Transport Layer Security).

In addition to encryption, ToolsGroup maintains rigorous processes for data integrity and availability. We monitor the cryptographic algorithms and protocols in use as part of our vulnerability management program, ensuring that we swiftly replace or upgrade anything that no longer meets current security guidelines.

Operational Security

Scalability and Performance
Federated Authentication and Single Sign-On (SSO)
Security Monitoring and Audit Logging
Change Management

ToolsGroup’s cloud solution is designed to scale to meet customer needs without compromising security. We offer standardized deployment tiers (Small, Medium, Large) that cover common workload profiles, and we can further scale resources on demand if your usage grows. This flexible scaling ensures that performance and responsiveness remain optimal as your data volume or user count increases, while keeping the environment secure and stable.

Passwords

To provide secure and convenient access for users, ToolsGroup supports federated authentication and Single Sign-On (SSO) integration with your identity systems. Federated SSO allows your users to log in to the ToolsGroup application using their existing corporate credentials, managed by your chosen Identity Provider (IdP), such as Azure Active Directory, Okta, PingIdentity, or others.

SSO contributes to stronger security. You can apply uniform login policies, such as requiring MFA or session timeouts, to ToolsGroup via your IdP. This also reduces the risk of weak or reused passwords since users are not creating new credentials for each software. Federated SSO support in ToolsGroup provides enterprise-grade identity management integration, helping you streamline authentication while maintaining full control and visibility.

ToolsGroup maintains centralized logging and real‑time monitoring to quickly detect suspicious or abnormal activity across its cloud environment. All key events—such as authentication attempts, user access, and administrative changes—are collected into a Security Information and Event Management (SIEM) system that analyzes patterns and alerts security staff to issues like repeated failed logins, unusual access times, or sudden role changes.

Audit logs are stored in a tamper‑resistant repository for at least 180 days to support investigations and compliance needs, with customers able to request relevant records. In addition to security events, an integrated monitoring system tracks system health—covering compute, storage, network, and application performance—and alerts the operations team to issues such as CPU spikes, memory leaks, or slow response times, enabling rapid, proactive response 24/7.

ToolsGroup maintains structured procedures on how to manage changes on systems supporting the Solution. This includes a change management process that requires formalized requests on the Ticketing Support Portal, a process to evaluate the impact of changes.

ToolsGroup Operators

 

ToolsGroup Operators working on the systems supporting the Solution are working from secured locations, connecting with TLS to the systems and using Multi Factor Authentication (MFA) for all sensitive operations. All ToolsGroup Workstations are using Full Disk Encryption and have no access to Customer Data.

Disaster Recovery and Business Continuity

 

ToolsGroup maintains up-to-date plans to manage the most common scenarios that can affect business continuity. These plans are tested yearly or more frequently if required by any significant change to the affected process and audited yearly as part of ToolsGroup’s ISO 27001 certification process.

 

To support this, and provide resiliency to the Solution, ToolsGroup provides business continuity in the following ways:

 

  • High availability for the underlying infrastructure and components.
  • Disaster Recovery in a secondary region.
  • Frequent Backups with multiple redundant copies.
  • Comprehensive monitoring to detect anomalies and events relating to outages and other events that may require immediate action. The monitoring system collects data from all systems that compose the Solution and can also issue alerts related to hardware and network capacity as well as security events and attacks.

Data that composes the Solution is organized in three layers:

 

01 / Virtualization layer

Data related to the Virtual Machines that support Solution components is encrypted at rest, replicated in multiple local copies and Geo-redundant.

 

02 / Instance layer

Using Azure native functionalities, ToolsGroup performs a full backup for the individual compute note or virtual machine that is kept for 15 days rolling. These backups are stored in multiple copies, Geo-redundant and encrypted at rest.

 

03 / Application data layer

This includes Customer Data stored inside the Solution and is backed up daily and kept for 15 days rolling.

Security Incident Management

 

ToolsGroup maintains policies and procedures to detect, manage and track any security incidents or events. The primary aim is the prompt detection of any incident or potential incident to reduce the risk of information exposure and to promptly communicate any breaches to all affected Parties and Authorities in the shortest time frame possible.

 

To support this process ToolsGroup has implemented:

 

  • A security incident response plan that clearly defines tasks and activities that need to be carried out to properly evaluate, classify, mitigate and respond to security incidents.
  • The definition of security-related roles and responsibilities within the organization, including the role of Information Security Manager and an oversight committee.
  • Processes aimed at the continuous improvement of security-related aspects in the Organization that include the period review of existing measures and their effectiveness.

Compliance

 

Compliance plays a critical role in providing assurance for Customers and in securing and bolstering the trust between the Customer and ToolsGroup. ToolsGroup maintains compliance with both local regulations as well as International Standards widely recognized in the industry.

 

 

 

 

/ ISO/IEC 27001:2013

ISO/IEC 27001 is a security standard that formally specifies an Information Security Management System (ISMS) that is intended to bring information security under explicit management control. As a formal specification, it mandates requirements that define how to implement, monitor, maintain and continually improve the ISMS. It also prescribes a set of best practices that include documentation requirements, divisions of responsibility, availability, access control, security, auditing, and corrective and preventive measures.

 

ToolsGroup currently maintains an active Certification in good standing for ISO/IEC 27001:2013. The Certificate as well as the Statement of Applicable Controls can be shared with Prospects and Customers for review upon request. The scope of the certification is “The Information Security Management System for the provisioning of SaaS (Software as a Service) services for Planning and Business Analytics solutions”.

 

As part of this process ToolsGroup has developed an Information Security Management System (ISMS) that is distributed to employees and contains policies, procedures, modules and instructions for internal use.

Your Data, Our Promise: Get Informed About ToolsGroup Security

Uncover answers, explore solutions, and unlock peace of mind.

Ask Your Security Question Now