Contact Us:

670 Lafayette Ave, Brooklyn,
NY 11216

+1 800 966 4564
+1 800 9667 4558

BUILD WITH US

At Uptake, we’re changing the world. We’re people who dare to dream, people who build and deliver results. We hire the best and brightest, bringing out our collective genius.

WHAT WE BELIEVE IN

Our Values

CLARITY

We’re open, clear, direct, and empathetic in our communications. We strive to take the most complex issues and simplify.

CURIOSITY

We’re open, clear, direct, and empathetic in our communications. We strive to take the most complex issues and simplify.

GRIT

We persevere in the pursuit of meaningful goals and have the ability to bounce back from setbacks. We embrace problems, and we invite change. We roll up our sleeves and dive in with unbridled commitment.

END-TO-END SECURITY

How we enforce and protect.

Uptake’s techniques push the limits beyond what’s expected of modern security programs.

Proactive Secure SDLC

Security is embedded in our software development lifecycle (SDLC). We safeguard data with continuous delivery and code-level security insights. We use static and dynamic code analysis, including process gates to prevent introducing vulnerabilities into the production environment.

Access and Authentication

Based on National Institute of Standards and Technology (NIST) requirements, users only receive the level of access necessary to perform their jobs. Data access control includes passwords, cryptographic keys and multi-factor authentication devices. In the physical realm, access control utilizes key cards, PINs, biometrics and 24/7 CCTV monitoring.

Access Zone Security

Our networks use a tiered classification framework to provide data separation. Each client-protected data enclave, whether physical or virtual private cloud, is a fully security-hardened stack that includes endpoint and network threat prevention, application firewalls and vulnerability scanning.

Information Classification

To determine the right level of protection, we first classify information before any ingestion takes place. We classify all data, provide clear visibility of threats, maintain highly restricted access and isolate live data from other environments. Once data ingestion begins, we encrypt information while it’s in transit and at rest.

Internal Hackers and Hunters

Our in-house Red Team performs continuous and proactive attack simulations to anticipate and mitigate unauthorized access, escalation of privileges and data theft. In response, the Hunters think like attackers to proactively protect our most critical systems and environments.

Threat Research

We’re not just working on the threats present today. Our security team monitors the latest emerging threats within the security industry in order to protect our critical systems and customer data.

OUR EXPERTISE

What sets our security apart.

How do we do it? With top-tier talent that thinks about security in every step of our process.

OUR TEAM

World-class security talent.

Our expertise spans Risk, Compliance and Privacy; Secure Cloud Infrastructure; Application Security; Threat Research; Physical Security; Red Teaming; and Incident Response.

OUR DIFFERENTIATED PROCESS

Uptake's Secure Software Development Lifecycle.

From pre- to post-development, our secure SDLC provides robust security for your critical assets.

REPORT AN ISSUE

To report a security issue, please email us at security@uptake.com.