|
1 | 1 | Polygon supports onboarding and offboarding employees by following a process that begins with each employee receiving a preconfigured laptop that auto enrolls in one of our Mobile Device Management (MDM) systems. MDM supports control of application usage and enforces security policy requirements on approved operating system versions and patch requirements. User access to shared services and Polygon approved SaaS tools is secured by providing the least amount of privileges required for an employee to perform their tasks. Privileges are role based and given to each employee based on the functional team they are assigned to. |
2 | 2 |
|
3 | | -Polygon uses single sign-on technologies to automate the administration of user access and permissions across all of our SaaS tools. Automating the provisioning and removal of users' access privileges limits the risk of human error and supports efficient auditing procedures. |
| 3 | +Polygon uses single sign-on technologies to automate the administration of user access and permissions across all its SaaS tools. Automating the provisioning and removal of users' access privileges limits the risk of human error and supports efficient auditing procedures. |
4 | 4 |
|
5 | 5 | When an employee exits the company, HR changes their status in our HRIS system, automatically removing their access to our SSO integrated SaaS platforms, and IT is immediately notified to initiate the wipe and recovery of their corporate system. |
6 | 6 |
|
7 | 7 | ## Security awareness training |
8 | 8 |
|
9 | | -Polygon utilizes a SaaS platform to provide an integrated approach to email and security awareness training for all of our employees. All employees are required to pass the training during their first weeks of employment. The key features of the platform are: |
| 9 | +Polygon uses a SaaS platform to provide an integrated approach to email and security awareness training for all of our employees. All employees are required to pass the training during their first weeks of employment. The key features of the platform are: |
10 | 10 |
|
11 | | -- Industry-specific modules: Reinforce critical concepts mapped to key industry standards and security frameworks, including ISO, NIST, PCI DSS, GDPR, and HIPAA |
12 | | -- Real-world assessment: Safely test employees on real-world threats with de-weaponized phishing attacks |
13 | | -- Comprehensive reporting: Track primary indicators of risk across the awareness training platform and take remedial action with easily discernible user risk scores |
14 | | -- Integrated risk insight: Leverage real-world click behavior to identify high risk users |
15 | | -- Effortless administration: 12-month programs with rapid deployment |
| 11 | +- Industry-specific modules: Reinforce critical concepts mapped to key industry standards and security frameworks, including ISO, NIST, PCI DSS, GDPR, and HIPAA. |
| 12 | +- Real-world assessment: Safely test employees on real-world threats with de-weaponized phishing attacks. |
| 13 | +- Comprehensive reporting: Track primary indicators of risk across the awareness training platform and take remedial action with easily discernible user risk scores. |
| 14 | +- Integrated risk insight: Leverage real-world click behavior to identify high risk users. |
| 15 | +- Effortless administration: 12-month programs with rapid deployment. |
0 commit comments