WHR Global Technology & Security
Our Technology
Our clients need to know their information is always secure and that WHR is prepared for any potential threats. To ensure the confidentiality, integrity, and availability of its IT systems and associated assets (hardware, software, and data), WHR maintains an information security program aligned to Federal Government Standards:
- Implementation of protocols as laid out by the Office of Management and Budget (OMB)
- Formal FISMA / NIST 800-53 based cybersecurity program
- Annual SOC 1® Type 2
- Annual third-party risk assessments
- Employee training and testing to improve our resilience to phishing and external threats
- GDPR compliant
- Privacy Shield certified (EU and Swiss)
- Client audits and assessments
Our technology doesn’t replace people, it allows for more communication. Our team has built our technology in-house to the needs of our specific clients.
Technology powers your business and makes communiication a breeze. That’s why we created a portal specifically for our clients.
Learn More In-Depth Information About Our Technology
Our security is based on industry standard defense concepts that provide many layers of security:
Personnel Security
- All WHR Group employees are trained annually on business ethics, privacy, and security
- Background and criminal checks are conducted where allowed by law, with additional screening available
Access Management
- We employ the Principle of Least Privilege as well as segregation of duties
- User accounts including privileged access is formally reviewed on a monthly basis
- Two-factor authentication for all employees
Infrastructure Security
- Data is encrypted at rest and in transmission
- Defense in-depth strategy utilizing a tiered infrastructure with firewalls, IPS, DMZ and endpoint security
- Endpoints are locked down, encrypted, and individually authenticated to the internal network ensuring only approved devices can connect
- Centralized and secured data center including redundant power backup with generator, fire suppression, and environmental controls
- Robust logging and proactive 24/7 monitoring using a Security Information and Event Management platform (SIEM)
- Multitier Vulnerability Management Program
Continuing Operations
- Encrypted backups with onsite and redundant offsite storage facilities
- Formal business continuity plan with annual disaster recovery testing
Compliance
- Formal FISMA / NIST 800-53 based cybersecurity program
- Annual SOC 1® Type 2
- Annual third-party risk assessments
- Employee training and testing to improve our resilience to phishing and external threats
- GDPR compliant
- Privacy Shield certified (EU and Swiss)
- Client audits and assessments
Ready to learn more about how we can help with your relocation services?