- GitHub. GitHub is a hosted service built on top of Git, the version control platform. GitHub is utilized for storage and change control for our HIPAA policies, configuration scripts and other infrastructure automation tools, as well as for source and version control of application code used by GYANT.
- Google Apps. Google Apps is used for email and document collaboration inside of the Company and with our business partners. Google Drive is used for storage of files and sharing of files with Partners and Customers.
- JIRA. JIRA is used for planning our software development and devOps activities, configuration management and to generate artifacts for compliance procedures.
- Travis. Travis is a continuous integration tool that is used to automatically run tests, enforce coding conventions (linting), check for code vulnerabilities, build docker containers, and deploy to our staging and production environments.
- Snyk. Snyk is a source code security checker that regularly scans our source code and its many open source dependencies for version upgrades, known vulnerabilities and available patches.
- Amplitude. Amplitude is a hosted analytics and event tracking software that helps us understand (anonymously) how users are interacting with the GYANT system.
- Slack. Slack is a hosted messaging and team collaboration tool we use to communicate internally. No PHI, passwords or other security-related information should ever be posted on Slack.
- KeeperSecurity. KeeperSecurity is a centrally hosted password management tool we use to manage and share credentials internally. This includes the KeeperSecurity browser plug-in, the only approved form-fill/password manager for web browsers to access GYANT systems.
- ESET or Microsoft Anti-Virus. Anti-virus software is used to protect our workstations against infections with malicious software, incl. computer viruses, ransom-ware or other malware.
- Remote access servers that allow external users to connect to workstations accessing GYANT systems (unless previously approved by the Security Officer)
- Browser plug-ins in profiles used to access GYANT systems (unless explicitly whitelisted by the Security Officer)
- BitTorrent or other file-sharing clients
- Non-standard operating systems or modifications to the operating system kernel