Pushlytics’s Commitment to Security
COMMITMENT TO SECURITY
Pushlytics takes the security seriously. We invest in security technology, certifications, and human training, then back up those defenses with compliance certifications and white hat attacks.
Safeguard your customers’ data with automatic PII detection, custom install configurations, and a Secure Delete User API. All data sent to Pushlytics is encrypted using TLS.
Pushlytics encrypts all data entering or leaving Pushlytics infrastructure with TLS/HTTPS. All of our databases (all located in AWS) are encrypted at rest. Each account’s data is logically separated, and access to data is protected by authentication and authorization controls.
Stay up-to-date with privacy legislation and policy compliance. Pushlytics is both SOC 2 and GDPR compliant. Pushlytics’s data infrastructure partners hold industry-leading security certifications such as SOC 2 and ISO 27001.
A comprehensive approach
We invest heavily in securing our infrastructure, and Pushlytics is certified to the highest industry standards across the globe.
Pushlytics takes a proactive approach to privacy. In addition to internal policies, personnel training, a Secure User Deletion API, and GDPR compliant data processing agreements, Pushlytics has an on staff Data Protection Officer.
Security is our top priority. We get biannual pen tests from third-party auditors. We also have an Intrusion Detection System that proactively monitors our application servers and infrastructure. Additionally, we enforce security training and compliance from all employees. For more information about our security and compliance policies, contact firstname.lastname@example.org.
Pushlytics encrypts all data entering or leaving Pushlytics infrastructure with TLS/HTTPS. Additionally, all of our databases (all located in AWS) are encrypted at rest. Each account’s data is logically separated, and access to your data is protected by strong authentication and authorization controls.
Pushlytics offers a number of custom configuration settings to avoid capturing PII. In addition to a built-in PII detector (which we actively monitor), Pushlytics lets you disable all text capture and prevent data collection on any given element.
culture or security
A culture of security
Pushlytics complements technical defenses with security awareness, comprehensive policies, and robust processes.
Data Protection Officer
Pushlytics has an on-staff Data Protection Officer (DPO) to manage personnel security compliance and training. This DPO also oversees Pushlytics’s proactive approach to privacy, security, and governance concerns and has both CIPP/E and CIPM certifications.
Policies and Procedures
Our policies ensure that we comply with applicable standards and regulations and offer business continuity and customer notification plans to satisfy your requirements.
Pushlytics is hosted in a SOC 2 certified facility. Physical access is strictly controlled by professional security staff, state-of-the-art intrusion detection system, and other electronic means. All staff must badge in and all visitor access to Pushlytics is monitored and stored in auditable logs.
All Pushlytics employees undergo security awareness training and are continuously updated on information security awareness via newsletters and relevant security notifications. Information security practices are reinforced through constant testing that mimics real attacks.