Here are some of our standard security policies:
- Customer data is logically separated within a single database.
- Data is encrypted at rest and in transit.
- Audit logs for customer activity are available within the console, under Alerts > Events.
- As per our security policy, we notify customers of any security breach within a set time window.
- All staff with privileged access are required to use hardware multifactor authentication tokens. In addition:
- Staff access to customer data using the runZero console is recorded in an audit log.
- Staff access to cloud systems used to host the platform is recorded in an audit log.
- Cloud database access is restricted to a subset of technical staff.
- As a company, we are SOC 2 type II compliant.
- We obtain an annual security audit from an independent security company, who have access to product source code for their analysis.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article