User Authentication Like you, we rely on the security protocols supported by your email providers to keep you safe. In addition, we validate all incoming emails using DKIM and SPF verification. This enable us to know if a message is coming from an authenticated server. Users logging into our application are protected by HTTPS secure communication sessions using SSL.

Network and Access Our infrastructure provides protection against common attacks such as distributed denial of service (DDoS) attack and detections for password brute-force search attempts. Application access points are secured by HTTPS secure communication sessions using SSL. In addition, OAuth is used to provide a separate layer of access control. System and user access to the infrastructure are logged and stored.

The entire infrastructure is hosted on Amazon Web Services (AWS). AWS utilizes state of the art electronic surveillance and multi-factor access control systems. The data centers are staffed 24×7 by trained security guards. The infrastructure resides behind a firewall and a Virtual Private Cloud, thus limiting resource access to a very few, well protected access points.