Skip to content
Request Demo
  • Home
  • Products
    • No-code underwriting rules engine
    • AI-Underwrite Assistant
  • User support library
    • Application interface
    • Underwriter Workbench
    • Document repository
  • About Us
  • Contact
  • Home
  • Products
    • No-code underwriting rules engine
    • AI-Underwrite Assistant
  • User support library
    • Application interface
    • Underwriter Workbench
    • Document repository
  • About Us
  • Contact

Vulnerability Management

⌘K
  • Risk management framework
  • Vulnerability program
    • Vulnerability Statement
    • Vulnerability Framework
  • User and administrator access controls
    • User and vendor access
    • Staff and Administrator access
  • AWS Network Security
    • AWS’s shared responsibility model for security
    • CloudTrail security configurations policy
    • Identity and Access Management (IAM) policy
    • Hosting checklist
    • Backup and disaster recovery arrangements
  • Data Security and Management
    • Data storage security and management
    • Data in transit
    • Monitoring of data in storage and transit
    • Control of data integrity
    • Scrubbing or anonymizing data
    • Set up to protect the website (firewalls, IPS)
  1. Home
  2. Docs
  3. Vulnerability Management
  4. Data Security and Managem...
  5. Monitoring of data in storage and transit

Monitoring of data in storage and transit

For further detail see BCP (Monitoring)

Monitoring undertaken by SM8 developers:

  • CS instance uptime
  • Load balancing
  • Storage uptime
  • Disk utilization and capacity
  • CPU utilization and capacity
  • Network Bandwidth Report

Doc navigation

← Data in transitControl of data integrity →
Still stuck? How can we help?
Updated on January 16, 2023
Was this article helpful to you? No Yes

How can we help?

© Sm8rtHealth LLP 2024 all rights reserved.

Access Control Policy and Privacy Policy and Terms of Service

Verified by MonsterInsights