FEATURES > SECURITY

we get it—your information needs 

to be secure. and we take critical

steps to ensure that it is.

secure storage.

Our data centers and network architecture are

built to meet the requirements of the most

security-sensitive organizations. All data is stored

in highly secure data centers located within

North America. Our infrastructure aligns with

dozens of compliance programs, ensuring that

dealcloser achieves and completes many

compliance segments.

cloud provider certification.

Our data centers are certified with numerous

certifications including, among others, ISO 27001

(Security Management Controls), ISO 27018

(Personal Data Protection), SOC 1 (Audit Controls),

SOC 2 (Security, Availability and Confidentiality)

and SOC 3 (General Controls) certifications.

Our data centers are also compliant with privacy

legislation from various jurisdictions including the

US, the EU and Canada.

secure storage.

Our data centers and network architecture are built to meet the requirements of the most security-sensitive organizations. All data is stored in highly secure data centers located within North America. Our infrastructure aligns with dozens of compliance programs, ensuring that dealcloser achieves and completes many compliance segments.

cloud provider certification.

Our data centers are certified with numerous certifications including, among others, ISO 27001 (Security Management Controls), ISO 27018 (Personal Data Protection), SOC 1 (Audit Controls), SOC 2 (Security, Availability and Confidentiality) and SOC 3 (General Controls) certifications. Our data centers are also compliant with privacy legislation from various jurisdictions including the US, the EU and Canada.

infrastructure security.

All of our systems are run on a dedicated

network that is locked down with firewalls and

carefully monitored. State-of-the-art

infrastructure is protected by biometric locks and

round-the-clock surveillance monitoring, making

physical access to the environment impossible.

data encryption.

Data transferred between you and dealcloser is

encrypted in transit with HTTPS. Filesystem

encryption is used to encrypt documents,

signatures, and other data at rest. Database data

is also encrypted, ensuring that all of your data is

stored securely—at all times.

infrastructure security.

All of our systems are run on a dedicated network that is locked down with firewalls and carefully monitored. State-of-the-art infrastructure is protected by biometric locks and round-the-clock surveillance monitoring, making physical access to the environment impossible.

data encryption.

Data transferred between you and dealcloser is encrypted in transit with HTTPS. Filesystem encryption is used to encrypt documents, signatures, and other data at rest. Database data is also encrypted, ensuring that all of your data is stored securely—at all times.

DDoS mitigation.

Availability is of paramount importance in the

cloud. dealcloser uses the latest defense

technologies and services to provide resilience in

the face of DDoS attacks.

data sovereignty.

We maintain complete control over the region in

which your data is physically stored. When you

create a project on dealcloser, you select the

jurisdiction where data will be stored. That

project’s data will then reside in that location.

DDoS mitigation.

Availability is of paramount importance in the cloud. dealcloser uses the latest defense technologies and services to provide resilience in the face of DDoS attacks.

data sovereignty.

We maintain complete control over the region in which your data is physically stored. When you create a project on dealcloser, you select the jurisdiction where data will be stored. That project’s data will then reside in that location.

backups.

We maintain multiple secure data centers and all

dealcloser data is continually backed up

between these data centers. All backups are

encrypted using GPG.

comprehensive audit log.

Every single page viewed and action taken on

dealcloser by any user is logged. This audit log

can be accessed by request. Contact us with any

audit log access requests.

backups.

We maintain multiple secure data centers and all dealcloser data is continually backed up between these data centers. All backups are encrypted using GPG.

comprehensive audit log.

Every single page viewed and action taken on dealcloser by any user is logged. This audit log can be accessed by request. Contact us with any audit log access requests.

penetration testing.

We undergo regular penetration testing to

ensure that our security measures are maintained

at the highest standard.

penetration testing.

We undergo regular penetration testing to ensure that our security measures are maintained at the highest standard.

do your job safely & securely.
are you ready to give us a try?

do your job safely & securely.

are you ready to give us a try?