BLEND Trust Center

The localization partner you can trust

At BLEND, we’re committed to providing you with enterprise-grade security, protecting your data and privacy rights, and upholding the highest compliance standards out there.

security

Security​

We place network security at the forefront of our agenda, adhering to all data privacy best practices. ​

Learn morearrow platform
Sertificate1

Compliance​

With ISO certification and GDPR compatibility, BLEND meets your most important compliance requirements

Learn morearrow platform
Privacy​

Privacy​

BLEND protects your privacy rights and allows you to maintain control over your data, so you can breathe easy. ​

Learn morearrow platform

Trusted by top enterprises around the world

xiaomi
Payoneer
Microsoft
Facebook
AliExpress
amazon
subway
iHerb
Security at BLEND

End-to-end security ​

Ensure the security of your data with our stringent network isolation and data encryption policies.
We place network security at the forefront of our agenda, adhering to all data privacy best practices. ​

Our internal security measures​

Organizational Security

BLEND Information Security Policy requirements apply to the entire BLEND organization and must be adhered to by all employees and individuals involved in these business processes.

All BLEND employees are required to follow the organization’s information security policy. BLEND’s Information Security Management System (ISMS) is overseen by its Chief Information Security Officer (CISO). BLEND is ISO-27001 certified.

Security Training and Awareness

All BLEND employees complete ongoing security and awareness training. We conduct regular access audits, password updates, and operate according to the principle of the least privilege. We also provide role-specific security training.

Hardware Security 

All employee laptops have encrypted hard drives and are password protected. System administrators are the only ones authorized to install, configure, and alter the hardware. All software installations, additions, modifications, and connectivity are monitored, reported, and automatically mitigated where needed.

Delivery and removal of equipment to/from the data center facility are authorized, logged, and always monitored. User-specific access credentials and MFA methods are required to access workstation equipment, services, and applications.

Physical Security 

BLEND’s office is monitored and protected by security and fire alarm systems. CCTV cameras are installed throughout the office and capture entrances and exits. Sensitive areas are protected with entry controls, with only authorized personnel allowed access.

All BLEND facilities are in the Cloud, with no employee physical access.

Network Security 

BLEND’s internal network is restricted, segmented, and password protected, with all network security-related events logged.

Software Security 

Our team of server specialists keeps the software and its dependencies up to date to eliminate potential security vulnerabilities. We use monitoring solutions to prevent and eliminate software attacks.

Incident Response 

BLEND utilizes a protocol to handle security events, including escalation procedures, mitigation procedures, and post-mortem investigations. All employees are informed of our policies.

Employee Vetting 

A background check is performed on all new employees, contractors, or other individuals with access to BLEND’s systems or the network in accordance with local laws.

Third-Party & Supplier Security 

BLEND implements vendor risk management practices to ensure that third parties are scrutinized and comply with security standards. See our sub-processors.

Image 1

Our application security measures

Secure, Reliable Infrastructure ​

BLEND uses Amazon Web Services (AWS) data centers for our computing infrastructure. AWS has ISO 27001 certification and has completed multiple SSAE 16 audits. For more information on their security measures, visit the AWS Cloud Security page.  

Cloud Environment 

We employ the most up-to-date methods and tools to keep our environment safe:

  •         Network segmentation and isolation
  •         All endpoints are firewalled and monitored
  •         Resource Access is available for approved personnel and logged
  •         Traffic is encrypted monitored for suspicious or malicious activity using AWS tools
  •         Redundant backup for VMs
  •         Cross-cloud backups for data
Application Security Standards ​

In addition to the benefits provided by AWS, our application has additional built-in security features:

  •       Two-Factor Authentication
  •       REST API Authentication (API Key)
  •       Role-based restrictive permission system
  •       Backups and versioning
  •       Password complexity standard
  •       Following OWASP Web-development security standards
PCI Obligations ​

BLEND does not store any customer billing information on our servers. All payments go through PCI-compliant partners. More details about their security setup can be found on our vendor list.

Access to Data

Customer data can only be accessed by authorized employees who require it for work purposes. We can limit data access upon request. Please consult your Project Manager.

Data Retention 

We retain data for as long as necessary for business purposes. Custom retention periods and conditions can be configured for enterprise clients. Please consult your Project Manager.

Business Continuity & Disaster Recovery 

BLEND has developed Disaster Recovery and Business Continuity plans, which are regularly tested and updated.

Penetration Testing ​

BLEND conducts annual penetration testing by an independent, third-party security audit agency. No customer data is exposed to the agency. A summary of the penetration test findings is available to enterprise customers upon request.

Image 3
Compliance at BLEND​

Service commitments you can rely on

BLEND meets the key compliance standards your business values.​

ISO2
ISO1
ISO4
ISO3
Privacy at BLEND​

Your privacy is our priority​

Our privacy policy

BLEND is committed to protecting our client’s data and privacy. To learn more, read our privacy policy.​

Read BLEND’s privacy policy

Get in Touch

Looking to natively embed your presence in new world markets? Speak with a representative today to discuss the perfect BLEND of localization services.