Unleash America 2024
May 7-9
Las Vegas
May 7-9, Las Vegas
Heading to Unleash America? Find Us at Booth 482 on May 8-9
Book a meeting now
Skip to content
MENU
Product
Skills Management
Job Role Skills Visibility
Dynamic Skills Taxonomy
Skills Assessments
Personalized Upskilling and Reskilling
Skills Gaps Analysis
Continuous Performance Management
Goals and OKRs
Regular check-ins
Feedback and Praise
Performance Reviews
Development Goals
Career Development & Growth Journeys
Employee Development Plans
1:1 Career Conversations
360 Feedback
Dynamic Career Paths
Succession Planning
Culture & Engagement Surveys
Employee Satisfaction Surveys
Pulse Surveys
Leadership Development Surveys
Employee NPS
Survey Templates
Talent Marketplace
Internal Mobility
Intelligent workforce planning
Projects and Goals
Development Opportunities
Mentorship Opportunities
Dynamic Career Paths
People Analytics & Nudging Automation
In-depth People Analytics
Nudging Automation
Smart Nudges
Predictive Analytics
Dashboards and Reports
Our friendly experts are happy to guide and support you in rolling out a successful implementation.
Request a demo
Company
Resources
Blog
Explore insights about skills, organizational development and the future of work
In The Spotlight
Learn more about Nestor and our mission of empowering a limitless workforce
Community
Stay connected with everything new in the world of HR
Understand how skills can turn into a transformative power for your organization
Learn more
Learn how to put our insights into action and start the skills transformation journey today.
Schedule a demo
Careers
Request a Demo
Enterprise Security and Compliance
We value your security and privacy
At Nestor, we take data security and privacy extremely seriously. Our team is driven by integrity and the utmost care to run tasks while securely maintaining customer data and personal information. We’ve outlined below some critical measures we have in place to ensure your enterprise security level and compliance.
Contents
Data protection
Data encryption
Data center security
Data availability
Data isolation
Application security
Authentication
Role-Based Access Control
Testing and review
Separate environments
Audit logging
Vulnerability management
Penetration testing
Vulnerability scanning
Code analysis
Data protection
Data encryption
Data in transit:
All data transferred between the user’s browser and Nestor’s servers is encrypted in transit. Nestor uses bank-grade TLS 1.2
Data at rest
: Data is encrypted at rest using 256-bit encryption via native AWS capabilities.
Data center security
Data center provider:
Nestor uses Amazon Web Services (AWS) to host its production servers, databases, and supporting services.
Virtual Private Cloud
: Our infrastructure is hosted in AWS VPCs.
Physical security:
Nestor’s infrastructure is managed by AWS. Please see this page for full details:
https://aws.amazon.com/security/
Access monitoring:
Accounts and permissions are reviewed on a regular basis to ensure that the principle of least privilege is maintained.
Data availability
Backups:
Nestor’s production systems and data are backed up on a regular basis. All data is persisted in a database that has transaction logging enabled and is fully backed up daily.
Data isolation
Database:
Nestor maintains the customer data segregated from other customers’ data through a dedicated database for each customer.
Dedicated server instance:
Nestor uses single-tenant application servers for enterprise customers.
Application security
Authentication
Customers can enable native Nestor authentication and/or Enterprise SSO for end-user authentication.
Role-Based Access Control
Access to Nestor’s systems is limited based on employee roles and responsibilities. Admins can provide limited-access permissions to certain accounts.
Testing and review
All changes to our application are subject to review and testing before being merged.
Separate environments
Nestor maintains segregated testing, development, and production environments.
Audit logging
User activities within Nestor are available in audit logs.
Vulnerability management
Penetration testing
Nestor’s team conducts regular penetration tests to identify deficiencies in the system that may affect critical assets.
Vulnerability scanning
Nestor conducts regular scans of our applications, systems, and infrastructure for security risks and vulnerabilities.
Code analysis
Nestor’s code repositories are regularly scanned for security issues using static code analysis.
×
We use cookies to ensure that we give you the best experience on our website. By using this site, you agree to this use. See our
Privacy policy
Ok