new range logo

Security

Security is Our Top Priority

At New Range, safeguarding our customers' data is our utmost priority. This page provides an overview of our security practices designed to protect your information. If you have any questions or need more details, please reach out to us at security@newrange.com.

Security Practices at New Range

Dedicated Security Team

Our technical team consists of skilled experts dedicated to enhancing our security posture. They receive ongoing training in security incident response and are available 24/7 to address any potential issues.

Infrastructure

Network-Level Security Monitoring and Protection

Our network architecture incorporates multiple security zones to prevent unauthorized access. Key features include:

Data Encryption

Business Continuity and Disaster Recovery

New Range maintains a comprehensive Business Continuity Policy (BCP) and Disaster Recovery Policy (DRP). We conduct annual tabletop exercises to prepare for various crisis scenarios, ensuring consistent operations. Our DRP is regularly updated and tested to guarantee quick restoration of services. We back up critical assets and store encrypted backups for 30 days, maintaining infrastructure configurations as code for rapid recovery.

Application Security Monitoring

We employ a robust application security monitoring solution that provides visibility into potential threats, enabling prompt responses to breaches. This includes monitoring exceptions, logs, and anomalies while maintaining a detailed audit trail.

Responsible Disclosure

We encourage compliance with our policies through our responsible disclosure program. Please avoid automated testing and conduct security assessments only with your own data. Report vulnerabilities to security@newrange.com, including proof of concept, and we will respond promptly.

User Protection

Compliance

New Range is SOC 2 Type I & II and SOC 3 certified demonstrating our commitment to high standards of data security through independent audits.

Employee Access

Our internal procedures restrict access to user data to only what is necessary. All access is tracked by our event-based system, monitored, and fully auditable, requiring dual sign-off for critical systems. Employees sign a Non-Disclosure and Confidentiality Agreement upon joining and participate in annual security training.