What type of researcher are you?

Academics & students

University students and faculty, institute members, and clinical or independent researchers

Companies & industries

Pharma, R&D and biotech professionals. Government or NGO employees in scientific roles.

Chat with us

* for more information or a demo

Labstep Security

At Labstep, data security is a priority in everything we do, and we take it very seriously. Earning and keeping your trust is central for our mission and for our success as a product and a company. We believe that our transparent security policy and confidence that your valuable data is safe with us form the basis for a trustworthy and honest link.

1. Frameworks & Hosting

Amazon Web Services provide a secure and well-tested foundation

Labstep has a continuous working relationship with Amazon Web Services (AWS), allowing for operating and hosting on the most secure and reliable cloud environment. This cooperation allows Labstep to build on a secure system, quickly detecting, iterating and resolving any issues. With Labstep’s active collaboration with AWS, we are responsible for the server maintenance on theplatform, rolling out latest bug fixes and patches without requiring any contribution from your side.

2. Network Security

AWS virtual networking allows for private access to production systems

We use AWS virtual networking to establish connections with limited access protected from the public access. Our production systems are only available to approved networks and are always protectedfrom the public internet, ensuring whitelisted traffic by applying multilayered firewalls which are continuously reassessed for security.

3. End-to-end Data Encryption

SSL connections and client-specific keys create a safe connection between client and server

Labstep always encrypts any transferred, stored, or processed customer data according to the beststandards. Labstep has both Encryption in Transit and full encryption at REST for S3 buckets, RDS database and ElasticSearch index. Our TLS/SSL connections ensure reliable encryption of all data thatenters Labstep’s servers from the Internet. We use AES-256 encryption to encrypt all the data beingstored in Labstep.

4. Backup and Accessibility

Labstep provides file back up with exceptional durability

We utilise the most advanced data backup technologies to minimise the risk of customer data loss. Labstep creates raw files for all images and other data uploaded by our users and storesthem in an extremely durable Amazon S3 storage service that offers industry-leading data availability, security and performance. Amazon S3 is a storage service with unmatched durability and support, used by the world’s leading organisations.

Our structured data is stored to the MySQL database adapted to synchronise to a backup. If the database failure occurs, backup can be connected with almost no downtime or data loss. The MySQL database is backed up daily and stored, allowing for a quick and accurate data restoration. We alsostore our weekly backups for 1 year and store our data in multiple geo-locations to ensure excellent data durability.

5. Independent Security Audits

Our annual security audits allow for the best protection

Labstep carries out annual security audits to ensure data transparency and integrity are maintainedto the highest standards. Third-party security professionals engage in annual grey-box penetrationtests to ensure up-to-date security.

Heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat. Aenean faucibus nibh et justo cursus id rutrum lorem imperdiet. Nunc ut sem vitae risus tristique posuere.

Our values

Value #1

Description of the value
Description of the value
Description of the value

Value #2

Description of the value
Description of the value
Description of the value

Value #3

Description of the value
Description of the value
Description of the value

7. Authentication

Easy integration for authentication systems

We facilitate your management system by allowing our clients to use their own existing authentication policies, making management, provisioning, or suspending users easy. Labstep can integrate with our users’ existing SAML or Google SSO setups, so that users can sign in using a single login, also integrating their existing two-factor authentication.

Additional security layers for your business

Two-factor authentification
Secure your accounts with two-factor authentication to ensure you are the only person that can login,even if your password is compromised.

IP Whitelisting: controlling access to trusted users
Use IP whitelisting as an extra layer of security to ensure your data can only be accessed from specific approved IP addresses.

8. Compliance

Labstep effectuates strict compliance to regulatory standards

Labstep strictly follows the regulatory compliance by FDA 21 CFR Part 11 through carrying out thorough audit trails, electronic signatures and electronic records support. The security practices used by Labstep comply with FIPS 200 and ISO27001. Additionally, Labstep can make you compliant with Good Laboratory Practice guidelines and Good Manufacturing Guidelines.

OWASP top 10

Labstep has adopted this documentation and mitigates these risks. The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

Our team: Labstep is created by top scientists and engineers

Labstep prides itself on the excellent team of scientists and engineers who have precisely designed Labstep based on the world’s best industry and technology practices. Our dedicated team of engineers constantly works on enhancing the current security systems, as well as evaluating the risks and trends in data security.

Labstep Security Overview

Information on our frameworks and hosting, end-to-end encryption and other measures to keep your data safe.