War in Ukraine: A Statement From SEDNA Founder and CEO, Bill Dobie

My heart breaks for the human suffering being caused by the Russian government’s unprovoked and illegal invasion of Ukraine.

As a business, we stand 100% with Ukraine. I have made a personal donation to various relief efforts, and employees have organized multiple internal fundraising and support initiatives. Furthermore, we continue to support our SEDNA colleagues who are directly impacted by the conflict to prioritize their safety and that of their families.

SEDNA is a part of the global supply chain for significant commodity operations. Large amounts of bulk agriculture, fertilizers, metals and energy products are managed over our smart email platform.

Our customers are struggling to support the energy and food needs of an increasingly complex world, not to mention the health and safety of their teams, the resilience of their supply chains, and in some cases the viability of their business models. It is our job to support them in this. Unless customers are non-compliant with the law or linked to the Russian government, this stance on support will not change. We are monitoring this daily, and have a rapid response team in place.

We do not intend to undertake new contracts, expanded services to affiliated companies, or go-to-market approaches with companies based in Russia or Belarus for the foreseeable future.

 

Bill Dobie,

Founder and CEO, SEDNA

 

FAQ

Below are some answers to some recent questions from customers:

 

1. What measures is SEDNA taking to secure operations in the current situation?

  • We continue to monitor and pay close attention to incoming HTTP requests. If we identify an unusual HTTP request, we bring it to the immediate attention of our customers to check the validity of the request.
  • We are running Penetration and Vulnerability testing with a third-party consulting firm to check for exploitable vulnerabilities in networks, web apps, and user security.
  • We are enhancing our network defenses to provide additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, and deeper integration with our firewalls.
  • We have reviewed security configurations attached to all our instances and ensured there is no unauthorized access.

 

SEDNA takes your security seriously. You can read more about our security standards here.

 

2. Is SEDNA’s business directly or indirectly affected by the current situation?

We are not directly affected. Our customers use email over our platform to help them manage commodity operations globally; we are liaising with them to help assure they are compliant with any relevant sanctions..

 

3. Does SEDNA depend on any third party suppliers that might be affected by the current situation?

We do not depend on any third party suppliers that might be affected by the current situation.

 

4. Does SEDNA facilitate remote locations/offices in any of the affected countries that are directly connected to SEDNA’s core infrastructure?

We do not have any remote locations/offices in RU, UA, or BLR that are directly connected to our core infrastructure.

 

5. Does SEDNA have an IT workforce or other support located at RU, UA, BLR?

We do not have any IT workforce or support teams in RU, UA, or BLR.

 

6. Does SEDNA have customer data or information stored or processed at RU, UA, BLR?

We do not have any customer data or information stored or processed in RU, UA, or BLR.

 

7. Does SEDNA have outsourced developers located at RU, UA, BLR?

We do not have any outsourced developers in RU, UA or BLR.

 

8. How high does SEDNA classify the specific risk for your business due to the current situation?

We are treating this situation as high-risk and are increasing our monitoring and assessment posture. We are implementing extra layers of network security against the risk of DDoS or Brute Force.

 

9. Is SEDNA currently experiencing increased cyber activities targeting your digital infrastructure (attempted but blocked cyber-attacks or reconnaissance activities like port-scans)?

We are not currently experiencing any increased cyber activities targeting our digital infrastructure.