Enterprise grade security

Enterprise-ready storage

 

To help service and scale to your business needs, we have created dedicated data storage centers in United States, Europe, Asia Pacific and Canada. This way you can rest assured that your data is subject to the laws and regulations of that area.

map
Layer 9

Strong data protection

 

We take the protection of your data seriously. Applying a practical framework designed to secure your information through strong cryptography in our encryption methods.

  • Data encryption at rest
  • Data encryption at transit
  • PGP enabled encryption for csv upload

Granular authentication

 

Control log-in and authentication method at a granular level for both administrators as well as the people you communicate with to keep your information secure.

  • Single-sign-on support (SSO)
  • Multiple levels of administrator access
  • Adjustable security for every communication (Basic, Multifactor, SSO)
  • Two-factor authentication
IMAGE
IMAGE1

Customizable user consent

 

Customize your data retention settings to comply with GDPR regulations, or your own data protection policy requiring user consent before start.

  • GDPR-compliant
  • Customizable user-consent forms
  • Configurable data retention time frames

Scalable support

 

Our infrastructure is designed for scalability and to safeguard your data against unlikely risk scenarios.

  • Autoscaling servers
  • Nightly backups
  • Point in time recovery (every 5 minutes)
IMAGE2
BSI Assurance Mark ISO 27001 KEYB (white)

Internationally certified

 

As a part of our practice to safeguard your information we conduct internationally recognized policies and procedures through the ISO/IEC 27001:2013 standard.

ISO 27001 is globally recognized information security standard.

SOC2 Type II compliant

 

SOC 2 Type II Audit is a third-party audit that’s part of the American Institute of CPA’s (AICPA) Service Organization Control reporting platform. In order to achieve SOC 2 compliance, Enboarder went through a rigorous audit of the security policies and controls it has in place to protect its customers’ data.

SOC2 Type II compliant

Want to learn more?

Join the Human Connection Revolution