Notifications

Good job! You’re all caught up

Join challenges and check your notification settings if you don’t receive notifications. We’re actively adding new notifications. Read our blog post for more info

Notifications
Earlier Dismiss All
You have no more notifications
THE MOST SECURE
WAY TO ACCESS
DIGITAL TALENT

Security is built into the Topcoder platform. Tools and features protect your data, obfuscate identity, scan for viruses, safeguard sensitive information, and ensure compliance.

Talk to our VP of Security

Security is an intrinsic component of Topcoder. Our platform enables collaboration and preserves privacy, allowing for experimentation with limited risk.”

img
John Wheeler
VP of Security, Topcoder

Platform Enabled
Security

Application Security

Continuous assessments on application security is realized through penetration tests, vulnerability assessments and source code reviews

Network Security

Firewalls are utilized to restrict access to systems from external networks and between systems internally. Threat detection is supported by AWS GuardDuty

Architecture

Topcoder follows the AWS Well-Architected principles to separate information systems based on the sensitivity of information and the principles of least privilege

Data Security

All traffic between the user and Topcoder is secured during transit via industry standard HTTPS/TLS encryption over public networks. Access to data is governed by Role-Based Access Control (RBAC)

Vulnerability Management

Vulnerabilities are managed by CVSS scoring system via Topcoder’s vulnerability management tool. External security posture and attack surface insights are gauged by multiple 3rd party network security scanning services

Security Assessments & Compliance

Topcoder utilizes ISO 27001 and FISMA certified data centers managed by Amazon, and consequently manages risk and undergoes recurring assessments to ensure compliance with industry standards

Disaster Recovery

Platform uses an active-active configuration and automatically switches to another database in case of failure

Privacy

Privacy is protected by authentication, access controls, data transport encryption, and HTTPS support for customer applications

RECEIVE TOP CROWDSOURCING STORIES, VIDEOS, PODCASTS, & MORE TO YOUR INBOX

Sign up for the newsletter