Security

Data privacy and platform security are top priorities at Dealerware. We have implemented robust measures to ensure our platform is reliable, secure, and designed with your protection in mind.

Network Security

Dealerware employs multiple layers of network defenses to safeguard our systems and prevent unauthorized access to your data.

Data Storage, Encryption

Dealerware uses advanced encryption technology to protect your data during storage and transmission.

Platform Security

Dealerware integrates robust platform security measures to ensure the safety of your digital and personal information.

Staff and Third Party Access

Strict access controls are in place to regulate and monitor both staff and third-party access to sensitive data.

Data Access Control

Dealerware enforces stringent data access controls to ensure only authorized personnel can access your information.

Network Security

Your data is transmitted through secure networks, protected against unauthorized internal and external access.

These measures include:

Data Storage & Site Security

Incident Response & Contingency Planning

Dealerware proactively identifies potential security risks through established controls, including:

Platform & Systems Security

Dealerware's products and services are designed to proactively address known security threats through multiple strategies:

Data Encryption

Dealerware safeguards the transmission and storage of customer data through the following measures:

Data Processing

When processing and handling customer data, Dealerware ensures robust safeguards are in place, including:

Access Controls

Only authorized personnel or service providers may access your data through established controls, such as:

Staff & Third Party Access

Dealerware is committed to maintaining the integrity of those handling your data through comprehensive measures, including:

Security Practices

Dealerware employs comprehensive data security controls to ensure the safe transmission and storage of your data:

  • SOC 2 Type 2 certified for rigorous security standards.
  • Data in transit is protected by TLS 1.2 encryption.
  • Stored data is secured and encrypted with 256-bit Advanced Encryption Standard (AES).
  • All connections are forced through HTTPS, ensuring encrypted data transmission.
  • Servers are hosted in U.S.-based AWS data centers that are SOC 1, SOC 2, and ISO 27001 certified.
  • Our data centers feature 24/7 security, fully redundant power systems, two-factor authentication, and physical audit logs.
  • Regular external penetration tests are conducted by third-party vendors.
  • Security awareness training sessions are regularly conducted for all employees.
  • Detailed audit logs are maintained for all internal systems.

New vulnerabilities or new patches are detected from the various monitoring and scanning in place. Many vulnerabilities will be addressed within 24 hours by automated update processes, at which time the vulnerability is closed out. Engineering tracks any vulnerabilities not addressable through automation through resolution.  Dealerware undergoes, at minimum, annual vulnerability scans and penetration testing, by an independent third party.

Dealerware maintains a publicly available status page for current and historical availability information at: https://dealerware.statuspage.io.

Dealerware is primarily hosted on Amazon Web Services (AWS) to ensure high availability of its services. Dealerware leverages industry leading cloud infrastructure and data security features provided by AWS to ensure our product and customer data is secure.

For more information on how AWS’ data centers secure your data, click here: https://aws.amazon.com/compliance/data-center/controls/

Dealerware follows security configuration standards that are documented and consistent with industry guidance, and where applicable may adhere to vendor guidelines.

Dealerware does not provide hosting solutions directly to its customers. However, Dealerware utilizes AWS for its own production environment, which provides at least three different, geographically separated, locations where the application is hosted for high availability and redundancy.

Dealerware is  SOC 2 Type II certified, which validates our strong commitment to data security, processing, integrity, confidentiality, and privacy.  

  • Information security is essential for Dealerware’s success and competitiveness. Our framework adopts the following Information Security Principles 
  • Apply a risk-based and economically reasonable approach to Information Security 
  • The purpose of the program is to protect and ensure confidentiality, integrity and availability of data and information assets in light of the business and any legal requirements 
  • Program requires implementing information security and risk management processes and procedures that are sustainable, adaptable and can transform.  
  • Continued  review, testing, and improvement of protocols is necessary.

Client or customer data is stored in our cloud environment for [90 days] but we may retain information as long as it is needed for processing and performing services for customers. 

Dealerware has policies for Data Classification, Encryption and Disposal Policy, and retention, and requires All web-based data transmissions to or from third parties to be transmitted through HTTPS and all data in transit is secured using TLS v1.2 at minimum. Access to the production environment is restricted via SSH and is controlled through Teleport as required.

Dealerware includes pre-defined customer-user roles including, Permissions Manager, Employee Manager, Service Advisors, and other internal admin permissions.  More information about access controls are described here: https://support.dealerware.com/hc/en-us/articles/360022563514-Learn-about-Employee-Account-Permissions

To review actions performed by people in your organization, Dealerware provides logs of audited user and system events. The Dealerware audit log lists events triggered in your organization within the last 90 days.

We can review the audit log to quickly review the actions performed by members of your organization. The audit log includes details such as who performed the action, what the action was, and when it was performed. We can use these details to troubleshoot access issues, perform security audits, or analyze specific events.

Dealerware maintains a BCDR – Business Continuity Disaster & Recovery to ensure the continued operations of the company. In the event of a localized disaster, Dealerware can continue its business operations with minimal interruption. The policy and plan is reviewed and tested, at minimum, annually by the Manager of Security, VP of Platform & Data Engineering, and other relevant team members. All incidents are tracked and managed internally by the respective teams.

Demo Dealerware+

Share your details with us, and we look forward to connecting with you soon.

Software Platform