We understand that security is your priority. That's why we use industry standard techniques and advanced security technologies to help protect your users and company data.
All connections to Reputada are secured via SSL/TLS. Any attempt to connect over HTTP is redirected to HTTPS.
Encrypted Email Transport
If your servers support TLS encrypted email, any data sent from Reputada by email will be delivered using encrypted transport.
Personally Identifiable Information (PII)
Data that could potentially identify a specific individual such as Email, Phone number, etc is encrypted and saved in our database.
Reputada is built according to secure development best practices with security reviews incorporated throughout the design, prototyping and deployment process. XSS, SQL injection, etc is incorporated by design.
Customer Data Protection
We classify and treat all data as confidential. Company data will not be leaked between companies/networks by design as the data model and data structures are cloned per company and treated as separate. Sensitive production data is never migrated or used outside of the production network.
Integrations - Permissions and Trust
An audit report of all the API that was invoked and the data that was fetched via Integrations is available anytime.
Separate Application & Data Servers
Reputada's web application servers are physically and logically separated from servers that store customer data.
Hardened Operating System
Reputada runs on hardened Linux servers. Externally exposed critical patches are addressed within 24 hours.
Data Center Security
Reputada relys on Amazon's cloud infrastructure that has been architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. Read more here.
We routinely run internal vulnerability scans and penetration tests.
Your data is backed up multiple times a day. Backups are transferred off-site over SSH and properly deleted after six months.
More Security & Control Tools
Single Sign-On (SSO)
If you would like more information on our security policy or if you would like to report a security issue, contact us. email@example.com