Ensuring the safety and privacy of your data is baked into our everyday processes throughout our organization. We take regular data backups and test recovery, run penetration testing, encrypt all data at rest and in transit, conduct static code analysis and third-party vulnerability scanning, sanitize our logs, secure individual customers at the database level, and many other cloud security techniques.
Read on for information about specific security practices, policies, and materials.
Can’t find what you’re looking for? Search through our articles or contact our support team and get a response within 24 hours.
Get help