WHR Global Technology & Security

Our Technology

Technology is a critical piece in any successful company, which is why we maintain our applications and manage our platform internally. Our technology provides you with the best possible service, ensuring your data and information is secure and it delivers year-over-year cost savings.

Our clients need to know their information is always secure and that WHR is prepared for any potential threats. To ensure the confidentiality, integrity, and availability of its IT systems and associated assets (hardware, software, and data), WHR maintains an information security program aligned to Federal Government Standards:

  • Implementation of protocols as laid out by the Office of Management and Budget (OMB)
  • Formal FISMA / NIST 800-53 based cybersecurity program
  • Annual SOC 1® Type 2
  • Annual third-party risk assessments
  • Employee training and testing to improve our resilience to phishing and external threats
  • GDPR compliant
  • Privacy Shield certified (EU and Swiss)
  • Client audits and assessments

Our technology doesn’t replace people, it allows for more communication. Our team has built our technology in-house to the needs of our specific clients.

Technology powers your business and makes communiication a breeze. That’s why we created a portal specifically for our clients.

Our technology doesn’t replace people, it allows for more communication. Our team has built our technology in-house to the needs of our specific clients.

Learn More In-Depth Information About Our Technology

Our security is based on industry standard defense concepts that provide many layers of security:

Personnel Security

  • All WHR Group employees are trained annually on business ethics, privacy, and security
  • Background and criminal checks are conducted where allowed by law, with additional screening available

Access Management

  • We employ the Principle of Least Privilege as well as segregation of duties
  • User accounts including privileged access is formally reviewed on a monthly basis
  • Two-factor authentication for all employees

Infrastructure Security

  • Data is encrypted at rest and in transmission
  • Defense in-depth strategy utilizing a tiered infrastructure with firewalls, IPS, DMZ and endpoint security
  • Endpoints are locked down, encrypted, and individually authenticated to the internal network ensuring only approved devices can connect
  • Centralized and secured data center including redundant power backup with generator, fire suppression, and environmental controls
  • Robust logging and proactive 24/7 monitoring using a Security Information and Event Management platform (SIEM)
  • Multitier Vulnerability Management Program

Continuing Operations

  • Encrypted backups with onsite and redundant offsite storage facilities
  • Formal business continuity plan with annual disaster recovery testing

Compliance

  • Formal FISMA / NIST 800-53 based cybersecurity program
  • Annual SOC 1® Type 2
  • Annual third-party risk assessments
  • Employee training and testing to improve our resilience to phishing and external threats
  • GDPR compliant
  • Privacy Shield certified (EU and Swiss)
  • Client audits and assessments

Ready to learn more about how we can help with your relocation services?