SECURITY
CENTRE
Pyramid is trusted by the world's leading retail brands to manage their most sensitive merchandising data. Security is built into every layer of the platform.
Enterprise-Grade Security
Pyramid operates at the heart of retail merchandising operations for brands like Nike, Primark, Under Armour, and Converse. Our security posture reflects the trust these organisations place in us to protect their planning data, forecasts, pricing strategies, and supply chain intelligence.
With over 20 years of enterprise deployment experience, our security practices have been refined through continuous engagement with the most demanding IT security and compliance teams in global retail.
Authentication & Access Control
Pyramid implements multi-layered access control to ensure that users only see and modify the data relevant to their role:
- Role-based access control (RBAC): Granular permissions tied to user roles, merchandise hierarchies, and location hierarchies
- Active Directory integration: Single sign-on (SSO) via corporate directory services
- User-level audit trails: Every action is logged with user identity, timestamp, and change detail
- Workflow-based approvals: Plan submissions and modifications follow configurable approval chains
- Business-defined filters: Access can be restricted by user, merchandise hierarchy, channel hierarchy, and custom business attributes
Data Protection
All data processed by Pyramid is protected through industry-standard security measures:
- Encryption in transit: All communications between client applications and servers use TLS encryption
- Encryption at rest: Database-level encryption for sensitive planning and commercial data
- SQL Server security: Leverages Microsoft SQL Server's built-in security features including Transparent Data Encryption (TDE)
- Backup and recovery: Automated backup schedules with point-in-time recovery capabilities
- Data isolation: Each client's data is logically isolated within the database architecture
Infrastructure Security
Pyramid deployments follow enterprise infrastructure security best practices:
- Network segmentation: Application, database, and analytics tiers are deployed in isolated network segments
- Firewall protection: Granular firewall rules control traffic between tiers and external systems
- Monitoring and alerting: Real-time monitoring of system health, performance, and security events
- Patch management: Regular patching cycles for operating systems, SQL Server, and application components
- Penetration testing: Periodic security assessments by qualified third-party security firms
Compliance & Standards
Pyramid supports our clients' compliance obligations across multiple regulatory frameworks:
- GDPR: Data processing practices aligned with the General Data Protection Regulation for European operations
- Data residency: Deployment flexibility to ensure data remains within required geographic boundaries
- Audit readiness: Comprehensive logging and reporting to support internal and external audit requirements
- Contractual security: Data processing agreements and security addenda tailored to enterprise client requirements
- Industry best practices: Security controls aligned with ISO 27001 principles and the Microsoft Security Development Lifecycle
Business Continuity
Pyramid's architecture is designed for high availability and resilience:
- Redundant infrastructure: Database mirroring and failover clustering for critical systems
- Disaster recovery: Documented DR procedures with defined Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO)
- Scheduled maintenance windows: Planned maintenance coordinated with client operations teams
- Performance monitoring: Continuous monitoring ensures system performance meets operational requirements
- Incident response: Defined escalation procedures for security incidents with clear communication protocols
Security Questions?
Our team is ready to discuss how Pyramid meets your organisation's security and compliance requirements.
Contact Us