Stannp | Direct Mail Marketing Platform
hero image

Platform & infrastructure security features.

icon

Security Assessment and Testing

Stannp maintains a rigorous security testing program with continuous automated vulnerability scanning across all infrastructure and monthly assessments with automated alerting. Independent third-party penetration testing is conducted by specialist security firms with all findings tracked to resolution, covering OWASP Top 10 as a minimum standard. Critical vulnerabilities are resolved within 7 days, high severity within 14 days, and medium severity within 30 days.

icon

Access Control

Stannp implements comprehensive HIPAA-compliant access controls across all systems using role-based access control (RBAC) with least privilege principles and mandatory multi-factor authentication. All users have unique accounts with no shared credentials for accessing Protected Health Information (PHI), and all access is logged, monitored, and regularly audited. Customer data is completely segregated through multi-tenancy architecture, with customers maintaining granular control over their team's access through platform-based user accounts.

icon

Data Encryption Standards

Stannp employs HIPAA-compliant industry-leading encryption to protect all customer data and Protected Health Information (PHI). We use 256-bit AES encryption for data at rest and TLS 1.2/1.3 for data in transit, consistently achieving A+ ratings from Qualys SSL Labs. All cryptographic keys are securely managed through Azure Key Vault with strict access controls and regular key rotation policies.

icon

Audit Logs and Activity Monitoring

We maintain comprehensive audit logs for all system access and data processing activities in accordance with HIPAA requirements, providing complete visibility and accountability across our platform. Our Security Information and Event Management (SIEM) system monitors activities 24/7 with daily automated reviews and real-time alerts for security events. All audit logs are protected against unauthorized modification with tamper-evident controls, and customers have access to user action logs within their accounts.

icon

Secure Development

Security is built into every application from the ground up through our security-by-design approach. All software is developed in-house following OWASP Top 10 guidelines, with complete environment segregation, mandatory peer code review, and comprehensive testing before any code reaches production. Regular penetration testing and vulnerability scans ensure ongoing security.

icon

API and Integration Security

Our API-first platform implements comprehensive security measures including token-based authentication, HTTPS/TLS encryption achieving A+ ratings, and intelligent rate limiting. All API activities are logged and continuously monitored through our SIEM system, with monthly vulnerability scans testing specifically for OWASP Top 10 threats.

icon

Data Storage and Security

Our infrastructure is designed to ensure HIPAA compliance, data sovereignty, and regulatory adherence through strategic data placement and network segregation. All data is stored on secure cloud-based infrastructure hosted on Microsoft Azure with comprehensive HIPAA-compliant security controls, encryption at rest and in transit, and complete audit logging. Customer data remains completely isolated through multi-tenancy architecture ensuring Protected Health Information (PHI) security.

icon

Security Architecture and Infrastructure

Stannp's security architecture is built on Microsoft Azure's HIPAA-compliant enterprise cloud platform with multiple layers of defense, comprehensive monitoring, and strict security controls. Our infrastructure uses separate virtual networks for complete environment segregation, multi-layer firewall protection, 24/7 SIEM monitoring, and mandatory multi-factor authentication for all PHI access. All security measures are regularly tested through independent audits, penetration testing, and continuously improved to maintain HIPAA compliance.

icon

Service Monitoring

We operate 24/7 infrastructure monitoring through our SIEM system with daily automated reviews of comprehensive audit logs covering all system activities. Continuous monitoring tracks performance metrics, system health, and security events with real-time alerts for anomalies. Our 99%+ uptime SLA is supported by redundant systems and high availability infrastructure.

icon

Backup and Recovery

Business critical data including PHI is automatically backed up every 15 minutes with daily full backups and weekly secondary backups, all stored in geographically separated server regions with HIPAA-compliant encryption. Backups are encrypted using 256-bit AES and retained for 30 days with 12 months total retention, ensuring comprehensive recovery options while maintaining data integrity. Our 99%+ uptime SLA is supported by redundant infrastructure with documented disaster recovery procedures.