We understand that security is your priority. That's why we use industry best practices and advanced security technologies to help protect your users and company data.
All connections to Ulteamo are secured via SSL/TLS. Any attempt to connect over HTTP is redirected to HTTPS.
Encrypted Email Transport
If your servers support TLS encrypted email, any data sent from Ulteamo by email will be delivered using encrypted transport.
Ulteamo is built according to secure development best practices with security reviews incorporated throughout the design, prototyping and deployment process. XSS, SQL injection, etc is incorporated by design.
Customer Data Protection
We classify and treat all data as confidential. Company data will not be leaked between companies/networks by design as the data model and data structures are cloned per company and treated as separate. Sensitive production data is never migrated or used outside of the production network.
Integrations - Permissions and Trust
An audit report of all the API that was invoked and the data that was fetched via Integrations is available anytime.
Hardened Operating System
Ulteamo runs on hardened Linux servers. Externally exposed critical patches are addressed within 24 hours.
Data Center Security
Ulteamo relys on Amazon's cloud infrastructure that has been architected to be one of the most flexible and secure cloud computing environments available today. It provides an extremely scalable, highly reliable platform that enables customers to deploy applications and data quickly and securely. Read more here.
We routinely run internal vulnerability scans and penetration tests.
Your data is backed up multiple times a day. Backups are transferred off-site over SSH and properly deleted after six months.
If you would like more information on our security policy or if you would like to report a security issue, contact us. info@Ulteamo.com