Data Protection & Security
Redlist user’s trust and rely on Redlist 24/7/365 to run multiple departments and millions of tasks every day. That is why we proactively safeguard our users to ensure they have safe reliable access to their data.
Built On a Secure Foundation
Redlist is built using the Microsoft Azure multi-layered security platform to ensure the highest level of data security. With robust encryption and cyber security infrastructure, users can rest easy knowing that their data is safe.
Real-time Backups of Your Data
Client data is backed up in real time. In the event of data corruption and can be restored to any point in time with plus or minus 5 minutes of precision (within the last 5 weeks) in the event of data corruption. Outside of the 5-week window backups precision decreases exponentially (ie. only daily, weekly or monthly backups may be available)
Your Data Encrypted
All data within Redlist is safeguarded by AES 256-bit encryption at rest as well as in transit. Ensuring no one can access the data that helps run your business. We also use standard TLS 1.2 to aid in the secure transfer of information between your device and our servers.
Geo-redundant Replicas
Redlist proactively creates encrypted real-time geo-redundant replicas of every database that allow for real-time fault tolerance. Ensuring that your system is up and running regardless of natural disaster.
We Secure Your Data At Every Point
Auto Idle Logout
Redlist uses automated logout features that prevent unwanted users from accessing your account after you have left your computer.
Logs
We use detailed logs to help us continually track the performance of the system and proactively fix issues that the system may encounter.
Internal Security
Only required Redlist personnel are able to view and access your database to ensure your private information is protected.
Take Security Mobile With Our Apps
Mobile App Security
Data transferred from our mobile apps is sent using the https protocol over our secure API. Learn more about the security of our mobile app on the App Store and Google Play Store.
RESTful API
For Sensor Connections, we use a unique API key stored securely within a digital vault.
Strong Software Architecture
To get more details on our software architecture schedule a demo with a member of our team.
Built Using the Platform Trusted By
Redlist Security FAQ
SaaS is a type of software delivery that gives the user the ability to access data from any device with an internet connection and web browser or through offline mode. In this software model the vendor (Redlist) hosts and maintains the servers, database, and the code that makes up the application.
Yes, at Redlist everyone understands the importance of security for our customers. We take strong steps to make sure that we are in line with industry-standard practices. Including, SOC-2 and ISO 2007.
Yes, All data within the Redlist application utilizes AES 256 encryption at rest as well as in transit.
Yes, all Redlist data is held in geo-redundant locations. This allows our customers to access their data even if a server or database location is destroyed during a natural disaster.