Our Commitment to
Security and Reliability
Blueprint delivers a highly secure world-class offering with 24/7 monitoring that helps customers save time and money on costly internal IT security infrastructure and maintenance. Zero-effort scalability also allows you to focus on your business, while we take care of your service infrastructure.
Data Center Security
Blueprint only operates in industry-standard data centers that are SOC II Type 2 and ISO 27001 compliant.
Data center access is highly restricted and granted only to authorized personnel using multi-factor and multi-stage authentication.
Application Support & Uptime
Request Support - Customers can log incidents or service requests 24/7, 365 days a year via the Blueprint Community Support Portal.
Response Time - Initial response and incident assignment will take place within two hours for Severity 1 incidents related to service availability and normal service operation.
Service Availability - Blueprint Cloud provides a monthly 99.5% uptime SLA.
For more details on our support terms, please click here.
Blueprint Cloud Services Hosting
Blueprint is committed to delivering reliable and secure cloud services. Each customer solution is hosted in one or more highly secure, scalable, Tier III-aligned data centers using one of our cloud partners.
Secure Website Access
Customers are provided with a dedicated, HTTPS-only website ensuring data security best practices.
Encryption in transit is provided using industry-standard TLS 1.1 or 1.2 protocols.
User access and authentication are handled via the built-in secure authentication system.
Customers can customize exactly what actions their users and administrators are allowed to perform by leveraging granular role-based access controls.
Single Sign-On — Customers can securely log in with their own user authentication systems by leveraging SAML 2.0. Blueprint products support both SP and IdP initiation and have been verified to work with ADFS 2.0.
Customers are provisioned with their own dedicated SQL databases to store all solution data and ensure data segregation.
Customer databases are encrypted at rest on disk using strong AES-256 encryption.
Blueprint completes comprehensive, regularly scheduled, independent, full-stack penetration testing.
Security updates are applied to Blueprint Cloud servers on a monthly basis.
Host-based intrusion detection and prevention (IDS/IPS) technologies are used to monitor and defend against intrusion attempts.
Security events are logged to a centralized event management service for alerting and analysis