The analysis is reviewed in person, distributed across the company and includes action items that will make the detection and prevention of a similar event easier in the future. We have functioning, frequently used automation in place so that we can safely and reliably rollout changes to both our application and operating platform within minutes. We typically deploy code multiple times a day, so we have high confidence that we can get a security fix out quickly when required.Īll of our services run in our own data center's. We run our own routers, load balancers and physical servers. We use both our own internal DNS servers and external DNS servers. Jottacloud services have been built with disaster recovery in mind.Īll of our servers are within our own private network with network access control lists (ACL’s) that prevent unauthorized requests getting to our internal network. DataĪll customer data is stored in Norway. We do not have individual datastore for each customer. The CloudStor path is whatever is after webdav/ in the url (davs:///plus/remote.However strict privacy controls exist in our application code to ensure data privacy and prevent one customer from accessing another customers data.Īll data sent to or from Jottacloud is encrypted in transit using 256 bit encryption.
0 Comments
Leave a Reply. |