Security of infrastructure and data is paramount, and we employ the strictest security measures to protect all the information enrolled into ENGAGE’s workflows. From information storage and access management to vulnerability management and auditing, these protocols and policies allow ENGAGE’s digital ecosystem to function at peak performance, all while mitigating threats before they even materialize.

  • Embrace the cloud for increased security and a more focused performance

    ENGAGE is hosted on AWS, the world’s most comprehensive and secure cloud platform. The cloud has multi-layered security measures, and is built to be more reliable and resilient than legacy counterparts.

    The physical AWS data centers and their supporting services, carry globally recognized certifications, including ISO/IEC 27001:2013 (Information Technology – Security Techniques – Information Security Management Systems) and ISO/IEC 27017:2015 (Information Technology – Security Techniques – Code of Practice for information security controls based on ISO/IEC 27002 for cloud services).

  • Gain access to top-notch cybersecurity

    Williams Lea’s Cyber Defense Team provides round-the-clock monitoring of external threat intelligence data relating to the technologies and services that make up ENGAGE. The platform also employs AWS GuardDuty, which provides automated threat intelligence notifications and intrusion detection services. This keeps Williams Lea fully aware of any potential threat or risk to the platform.

    ENGAGE undergoes regular internal and external security testing and vulnerability assessment by internal teams and accredited independent experts.

  • Manage access, authentication, and authorization

    Access management adds an extra layer of security on ENGAGE. You can control which individuals have access to specific flows of information.

    ENGAGE employs strict access controls, such as role-based access control for accurate access permissions, Single Sign On (SSO), and AWS Remote Desktop Gateways for encrypted connections, and multifactor authentications.