Security Strategy

Security

Security

Our record speaks for itself

Millions of messages. Over 25 years of operations. We’ve never lost a single one.

A 360 security approach

security-access-security-80x80-1
Access Security

Granular access rights, and configurable user roles, tightly control access to archived data and application functionality.

security-physical-security-80x80-1
Physical Security

Biometric controls provide additional security for access to sensitive areas of our private data center.

security-data-security-80x80-1
Data Security

Archived data is dual encrypted at rest, with military-grade algorithms. Data preserved in a tamperproof, non-rewritable, non-erasable format.

Operational Security

security-cybersecurity-operations-center-48x48-1
Cybersecurity Operations Center

Centralized security information and event management system (SIEM), collects and correlates logs in real time.

insurance-risk-managementr-48x48-2
Risk Reduction

Targeted attack detection, and denial of service protections, keep data safe and available. 24 hourly scans and pre-release code reviews pre-empt threats.

security-penetration-testing-48x48-1
Penetration Testing

Annual penetration testing by a third party auditor provides independent analysis of attack vectors and security vulnerabilities.

security-recoverability-48x48-1
Recoverability

Highly secure, resilient, and scalable IT infrastructure in two mirrored data centers supports failover in the event of a disaster.

We leveraged evaporative cooling for our new facility, a design strategy that would cut our energy usage by half.

Warren Roy, CEO & Founder Global Relay

contact-support-48x48-1
24/7/365 Support

Follow-the-sun support for true global customer service.

Discover-Web-Page-Telephone-Icon-Graphic-11-25-48x48px-V2
Phone, email, and message

You’ll never get a voicemail.

support-star-48x48
5 Star Reviews

Top marks in peer reviews for our unrivalled customer service.