Cloud Security
· Cloud Infrastructure Security
All of our services are hosted with Amazon Web Services (AWS). They employ a robust security program with multiple certifications. For more information on our provider’s security processes, please visit
AWS Security.
· Data Hosting Security
All of our data is hosted on Amazon Web Services (AWS) databases. These databases are all located in the [United States]. Please reference the above vendor specific documentation linked above for more information.
· Encryption at Rest
All databases are encrypted at rest.
· Encryption in TransitOur applications encrypt in transit with TLS/SSL only.
· Vulnerability Scanning
We perform vulnerability scanning and actively monitor for threats.
· Logging and Monitoring
We actively monitor and log various cloud services.
· Business Continuity and Disaster Recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
· Incident Response
We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.
· Information Security Program
We have an Information Security Program in place that is communicated throughout the organization. Our Information Security Program follows the criteria set forth by the SOC 2 Framework. SOC 2 is a widely known information security auditing procedure created by the American Institute of Certified Public Accountants.
· Vulnerability Scanning
We perform vulnerability scanning and actively monitor for threats.
· Logging and Monitoring
We actively monitor and log various cloud services.
· Business Continuity and Disaster Recovery
We use our data hosting provider’s backup services to reduce any risk of data loss in the event of a hardware failure. We utilize monitoring services to alert the team in the event of any failures affecting users.
· Incident Response
We have a process for handling information security events which includes escalation procedures, rapid mitigation and communication.
Contact Us
If you have any questions, comments or concerns or if you wish to report a potential security issue, please contact
security@Transmit.Live.com.