CLOUDIFYWe take security seriously at CLOUDIFY, and understand the importance of ensuring that data is managed with confidentiality. The following describes our commitment to security on the CLOUDIFY platform. For any questions or concerns please contact security@CLOUDIFY.com.

Application Security

Visibility and control of all project access

  • Visible pricing information is localized to individual projects.
  • Users requesting pricing information on the CLOUDIFY marketplace are shown their own projects only.
  • CLOUDIFY administrative staff members have access to projects to serve support requests on behalf of users.

Visibility and control of all pricing access

  • Vendor users may store pricing information on the CLOUDIFY marketplace for use in generating quotes.
  • Vendor users providing pricing information on the CLOUDIFY marketplace have access to their own pricing information only.
  • CLOUDIFY administrative staff members have access to pricing information to assist vendors with data questions.

Encryption All data transfers from a device to CLOUDIFY secure cloud software with industry standard 2048-bit SSL encryption. Secure authentication Passwords are stored and transmitted securely and hashed using a strong salt. Protection against application attacks CLOUDIFY uses controls and technologies to prevent attackers from exploiting application-level vulnerabilities. Physical Security

  • CLOUDIFY runs on Amazon Web Services infrastructure and the Heroku platform.
  • Systems are hosted in ISO 27001 and FISMA certified data centers managed by Amazon Web Services
  • Physical access is strictly controlled both at the perimeter and at building ingress points
  • Data centers employ onsite security staff, video surveillance, and intrusion detection systems
  • Authorized staff must pass two-factor authentication a minimum of two times to access data center floors
  • Data centers are housed in nondescript facilities
  • Physical security verified by third-party auditors

Availability CLOUDIFY software runs in data centers in the United States and Europe, with protocols for switching from one zone to another in the event of any disruption to service availability.