E2EPlan Tree Logo

e2eplan

Security Overview


Our first few attempts at explaining our security architecture were, as our friends and family described it, way too technical. Apparently, most users really don’t care that we’re using FIPS 140-2 compliant asymmetric encryption algorithms at the transport layer and FIPS-197 symmetric encryption for data at rest, etc, etc. They just want to know it’s secure and have a high level understanding of how it’s secure.

So we did an infographic for them, kind of as a joke, but they liked it, so here you go. If you'd rather read a snazzy high level overview (pdf) please click here

Communication Encryption Diagram


Multifactor Authentication Diagram


Role Base Access Control Diagram


Encrypted Storage Diagram


Secure Content Deletion Diagram


Privacy and Security of Your Information Diagram


Corporate Annual Background Checks Diagram
1
Create your account
2
Pick your categories
3
Decide who gets access to what & when
4
Gather your data
5
Add it to your plan
6
Relax! Update only as needed