How we stay secure
Cloud product security
We employ numerous controls to safeguard your data including encryption in transit and at rest across all our cloud services.
Our dedicated security team always upholds our secure software development and industry-accepted operational practices.
We perform rigorous security testing. If incidents occur, we utilize our incident response practices and inform with real-time system status.
Cloud hosting infrastructure
Our cloud infrastructure uses elastic scale, multi-level redundancy, and failure options to scale, reduce latency, and maintain reliability.
You can always stay informed of our system availability and performance. The real-time status of Relesys cloud products is posted on our Status page.
We offer an SLA of 99.8% uptime so your teams can rely on products that actually allow them to focus on your organization’s objectives.
We are always improving product and platform performance. We monitor metrics such as load times, search responsiveness, and media files.
Product and data safeguards
We perform database backups daily and our Business Continuity and Disaster Recovery programs minimize impact in case of operational disruptions.
We implement controls at every point of the development lifecycle using SOC2 and ISO 27001 standards and practices.
Further enhance your security and login processes.
Link logins or generate single-use passwords so users only need one login entry.
Create a 4 digit PIN code to limit unathorised access and ensure that extra layer of security.