cropped-new-7.png

Count on Apster to keep your data protected

Apster keeps your organization and personal data safe while you build automated and efficient workflows. Improve your processes with confidence on our secure platform.

Compliance and security are our number one priorities

As a company focused on your data security, Apster complies with Information Security best practices to make sure all of our environments are secure. We ensure a safe and secure solution. Contact our compliance team to learn more about Apster’s certifications and compliance atestations; and our security team for technical consultations.

Security and Legal Content

Privacy Policy
LGPD Commitment
Terms and Conditions
Security Overview

Key Features

Product Security
Network & Application Security
Additional Security Features
Report Vulnerability
Abuse Prevention
Product Security

Permissions

Set permission levels to high or low privileges, managing what each user can see, edit or change inside your organization’s environment using flexible role profiles.

Password Complexity

Apster requires password complexity, following market standards. We also protect credentials using a high cryptographic solution.

Uptime

Apster has a 99.9% or higher uptime, which shows our product’s high availability.

Network & Application Security

Storage and Data Hosting

Apster hosts services and data in Google Cloud Platform (GCP) facilities (us-central1-c) in the USA.

Back-Ups and Monitoring

Apster produces audit logs for all activity on the platform. We have active monitoring and backups in place to recover the information if anything happens within our environment.

Encryption

All data within Apster is encrypted in transit and at rest using 256-bit encryption, which provides a better and more secure service.

Permissions and Authentication

Access to customer data is limited to authorized employees only. We ensure Apster’s environment is protected by strong password policies on our code repository, our email provider, and GCP. Apster’s platform, developers’ site, and help site are delivered 100% onto HTTPS.

Incident Response

Apster has a protocol for handling security events which includes escalation procedures, rapid mitigation, and postmortem. All tech employees are informed of our policies.

Additional Security Features

Confidentiality

We respect your data and information, all of our employees sign confidentiality agreements.

Policies

Apster has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees.

Training

All employees complete Security and Awareness training annually. The engineering team constantly goes through security development training.

Report Vulnerability

No technology is perfect.

Apster’s security team believes that working with skilled researchers worldwide is crucial in identifying weaknesses in any technology. If you think you’ve found a security issue in our product or service, we encourage you to notify us.

We welcome working with you to resolve the issue promptly.

Abuse Prevention

Apster has a strict anti-abuse policy. We don’t allow spam and don’t want you to feel harmed by someone using our system.

If you have been spammed or abused in any way as a result of using Apster, please contact our team through our anti-abuse form. Apster’s Security team will be pleased to investigate and solve the issue. Our mission is to keep you and your data secure.

plugins premium WordPress