/ Security

Safe & Reliable

Our Security

We protect your data with encryption in transit and at rest, and provide administrative controls to enforce organization-wide protection such as SAML SSO, enforced 2FA and SCIM.

Cloud Product Security

Security is built into the fabric of our cloud products. We employ numerous controls to safeguard your data including encryption in transit and at rest across our cloud services, external vulnerability research such as our Bug Bounty program and more.

Security Operations & Best Practices

Our dedicated security team approaches security holistically with a common controls framework. Security threats are prevented using our secure software development practices and industry-accepted operational practices.

Platform & Network Security

We perform rigorous security testing including threat-modeling, automated scanning and third-party audits. If an incident occurs, we resolve the issue quickly using our security incident response practices and keep you informed with real-time system status.

Availability & Continuity

We maintain high levels of availability with multiple geographically diverse data centers and robust Disaster Recovery and Business Continuity programs. Physical access to our data centers is strictly controlled with comprehensive security measures by our data center hosting partners.

Key Security Offerings

Here’s a look at some of our most significant and highly-requested security features:

  • Data encryption in transit

  • Data encryption at rest

  • ‍SAML-based SSO with all major portals

  • User provisioning (SCIM)

  • Enforced two-factor authentication (2FA)

Platform and Network Security

Security is built into the fabric of our cloud products. We employ numerous controls to safeguard your data including encryption in transit and at rest across our cloud services, external vulnerability research such as our Bug Bounty program, and more.

Availability and Continuity

We maintain high levels of availability with multiple geographically diverse data centers and robust Disaster Recovery and Business Continuity programs. Physical access to our data centers is strictly controlled with comprehensive security measures by our data center hosting partners.

Key Security Offerings

Here’s a look at some of our most significant and highly-requested security features:

- Data encryption in transit

- Data encryption at rest

- SAML-based SSO with all major portals

- User provisioning (SCIM)

- Enforced two-factor authentication (2FA)

Reliability

Our products are designed for high performance and availability. It's built on best-in-class core technologies such as Microsoft Azure Cloud Service so your organization can scale confidently and securely.

Relesys' Cloud Hosting Infrastructure

Our cloud infrastructure takes advantage of elastic scale, multi-level redundancy and failure options across regions to reduce latency, maintain reliability and scale with your organization's needs.

Real-time Status Transparency

We make it easy to stay informed with our system availability and performance at all times. The real-time status of Relesys cloud products are posted on our Statuspage.

See Our System Status
Guaranteed Availability

We offer a SLA of 99.8% uptime with our Relesys Premium and Enterprise plans, so your teams can count on reliable products that allow them to focus on your organizations objectives.

See Our SLA Policy
Platform Performance

We continuously look for ways to improve product and platform performance by monitoring key performance metrics such as load times, search responsiveness and media files.

Product & Data Safeguards

Our Business Continuity and Disaster Recovery programs ensure the impact on our customers is minimized in the event of a disruption to our operations. Should you need to recover your data, rest assured knowing our backup program automatically performs daily application and database backups on Relesys cloud services.

Quality Controls

We are relentless when it comes to preventing possible points of failure. We implement controls at every point of the development lifecycle using SOC2 and ISO 27001 standards and practices. We also utilize industry-verified quality control processes such as chaos engineering, staging environments and internal dogfooding which enables us to proactively identify issues.