We protect your data.
All data is written to multiple disks instantly, backed up daily, and stored in multiple locations. Files that our customers upload are stored on servers that use modern techniques to remove bottlenecks and points of failure.
Your data is sent using HTTPS.
Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS. Any files which you upload to us are stored and are encrypted at rest. Project data, messages, text documents and todos aren't encrypted at rest — they are active in our database. Our backups of your data are encrypted using GPG.
Full redundancy for all major systems.
Our servers — from power supplies to the internet connection to the air purifying systems — operate at full redundancy. Our systems are engineered to stay up even if multiple servers fail.
Sophisticated physical security.
Our state-of-the-art servers are protected by biometric locks and round-the-clock interior and exterior surveillance monitoring. Only authorized personnel have access to the data center. 24/7/365 onsite staff provides additional protection against unauthorized entry and security breaches.
Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored. While perfect security is a moving target, we work with security researchers to keep up with the state-of-the-art in web security.
We protect your billing information.
All credit card transactions are processed using secure encryption—the same level of encryption used by leading banks. Card information is transmitted, stored, and processed securely on a PCI-Compliant network.
Trust our business.
We've been around the block and we've seen a lot of companies come and go. Security isn't just about technology, it's about trust. Over the past 15 years we've worked hard to earn the trust of over hundreds of thousands of companies world wide. We'll continue to work hard every day to maintain that trust. Longevity and stability is core to our mission at eSpear.
SOC2 Type 2 Audit and OWASP Testing.
eSpear itself undergoes an annual independent SOC2 Type 2 Audit. Each of our systems undergoes OWASP Top 10 Testing twice per year.
eSpear itself and all of eSpear’s systems are designed to meet the data privacy requirements of every jurisdiction in which our customers operate, including the EU’s new General Data Protection Directive.
Want to know more?
Submit a support request if you have other security questions and we'll get back to you as quickly as we can.
Have a concern? Need to report an incident?
Have you noticed abuse, misuse, an exploit, or experienced an incident with your account? Please visit our security response page for details on how to securely submit a report.