ÒÁÈËÖ±²¥

Skip to content

Security & COmpliance

Committed To Data Security Because You Expect Nothing Less

Security at code42

We are committed to the security of your data.

The strongest encryption of data, both in transit and at rest, is what to expect from our services.

You also expect to be in compliance with government regulations, that your data is safe no matter which storage location you choose, and that your vendors follow the strictest security policies for their own data.

We’ve been meeting expectations since 2001. That’s why more than 50,000 businesses trust us with their data. Our customers include 7 of the world’s 10 largest technology companies and government agencies held to the highest standard of information privacy.

A ÒÁÈËÖ±²¥ guiding principle

Security is a guiding principle here at ÒÁÈËÖ±²¥. Utilizing industry standards and verification by independent auditors, we take a comprehensive approach to secure our products and solutions. As a ÒÁÈËÖ±²¥ customer, here’s what you can expect:

  • ÒÁÈËÖ±²¥ maintains end-to-end control of cloud stack software, server, storage, network, monitoring and security components
  • Rigorous quality testing of platform and product code that follow industry security best practices
  • Data encrypted in transit and at rest
  • Decryption of file contents only happens through the ÒÁÈËÖ±²¥ application – not a human being
  • Strong authentication protocols ensure only authorized customer access
  • Ongoing vulnerability tests by professional third party and internal teams
  • Full time monitoring of ÒÁÈËÖ±²¥ cloud environment with a dedicated response team
  • Comprehensive security awareness training program for all ÒÁÈËÖ±²¥ personnel

ÒÁÈËÖ±²¥ maintains compliance certifications and attestations on our product and infrastructure to validate our robust security program. Additionally, ÒÁÈËÖ±²¥ ensures and monitors appropriate security assurance obligations (SOC 1, SOC2, ISO27001) for its cloud data centers.  Learn more about our compliance certifications and standards below.

*Other organizations, such as managed service providers and resellers, may provide cloud storage using ÒÁÈËÖ±²¥ cloud hardware and software. The information on this page may not apply to the cloud data centers managed by those organizations. Please contact those organizations for information about the features of their cloud solutions.

How ÒÁÈËÖ±²¥ responds to industry security incidents

Compliance at code42

Compliance is built in to everything we do.

Whether you’re protecting the data of patients, cardholders, or employees, you expect it to be easy and cost effective to comply with ever-changing requirements.

Compliance regulations abound across industries and geographies. Our platform helps you comply with regulations governing where and how your data is stored, who can access it, and who can decrypt it. Here is a guide on how ÒÁÈËÖ±²¥ ±õ²Ô³¦²â»å°ùâ„¢ supports your compliance.

All our deployment options provide:

  • Centralized policy management
  • Enterprise-wide administration with complete visibility of data and users
  • Tamper-proof audit trails
  • Compliance with data export laws
  • Data access strictly via strongly authenticated customer credentials
  • Permanent data deletion after your subscription ends
  • Single-click Compliance Settings to automatically restrict data access based on your regulations

Endpoint protection is a key component of most security and privacy regulations. ÒÁÈËÖ±²¥ helps customers meet their applicable compliance and risk management requirements.

Didn’t find what you were looking for?

Contact ÒÁÈËÖ±²¥ to learn more about why our customers benefit from cloud solutions without comprising their data security, regulatory or privacy requirements.

Contact Us