Trust and Security

Security was based into Easyflow's platform from the very beginning.

Comprehensive Data Security

We take data security very seriously. Our cloud platform includes a multitude of features such as dynamic data masking and end-to-end encryption for data in transit and at rest.

Infrastructure Security & Resiliency

Built by leveraging the most sophisticated cloud security technologies available.
The result is a service that is secure and resilient, giving you the confidence to enable your most demanding workloads with Easyflow.

Security governance and controls

Easyflow has adopted a framework of policies and procedures that includes all legal, physical and technical controls. In addition, support for SOC2 Type 2, PCI DSS,and GDPR compliance.

Comprehensive Data Security

Confidentiality

Data confidentiality is about protecting data against unintentional, unlawful, or unauthorised access, disclosure, or theft.

Easyflow manages data confidentiality, follow these guidelines:

Encypt data in transit and at rest.
Access Control
Secure data and assets disposal.
Manage data acquisition and utilization
Integrity

Data integrity is about protecting data against improper maintenance, modification, or alteration.

Easyflow manages data integrity, follow these guidelines:

Data Backup
Manage data access
Enable Logging
Data verification and validation
Availability

Data availability is about the timeliness and reliability of access to and use of data. It includes data accessibility.

Easyflow manages data availability, follow these guidelines:

Data Backup and Inventory
Record retention policies and procedures
Securely dispose of data
Criticality

Data criticality is a reflection of how vital data is to the Client's missions and processes. It is a combination of data integrity and availability.

Easyflow organizes data into categories, each has its security policies:

Non-critical
Critical
Mission Critical

Infrastructure Security & Resiliency

Built by leveraging the most sophisticated cloud security technologies available.The result is a service that is secure and resilient, giving you the confidence to enable your most demanding workloads with Easyflow.

Easyflow manages infrastructure security and resiliency, follow these guidelines:

Reduce attack surface, by hardening operating systems, minimizing components, libraries, and externally consumable services in use.
Enable people to perform actions at a distance, by removing the ability for interactive access reduces the risk of human error, and the potential for manual configuration or management.
Validate software integrity, by implementing mechanisms (e.g. code signing) to validate that the software, code and libraries used in the workload are from trusted sources and have not been tampered with.
Automate compute protection, by including vulnerability management, reduction in attack surface, and management of resources.
Create network layers, by using segmentation techniques.
Control traffic at all layers, by considering the connectivity requirements of each component.
Implement inspection and protection, by inspecting and filtering traffic at each layer.
Automate network protection, by providing a self-defending network based on threat intelligence and anomaly detection.

Security governance and controls

Easyflow has adopted a framework of policies and procedures that includes all legal, physical and technical controls. In addition, support for SOC2 Type 2, PCI DSS, and GDRP compliance.

SOC2 Type 2: Easyflow is in process of getting SCO2 Type 2 certificatio ,which means that the design and operating effectiveness of our service organization's system has passed a rigorous 6-month security audit. Easyflow engages in regular SOC 2 audits that are conducted by an independent, third-party auditing firm. Contact us to request the latest copy of our SOC 2 audit.
General Data Protection Regulation (GDPR): Easyflow is committed to compliance with the General Data Protection Regulation (GDPR), which went into effect May 25, 2018, and applies to individuals in the European Union. Please contact us to have an in-depth conversation about Easyflow’s approach to GDPR and Trust.
Penetration testing, The Easyflow Platform undergoes regular penetration testing by independent third parties to ensure that our platform is secure.
Privacy, Click here to read Easyflow's privacy policy.

Ready to start automating?

Getting started with Easyflow is simple, secure and there's no installation required.

1. Choose your apps

Select and authorize the apps you want to sync.

2. Connect

Hundreds of prebuilt templates

3. Let it start!

Set it and forget it, Easyflow will take over from here!
This website uses cookies in order to offer you the most relevent information. Please accept cookies for optimal performance.
Yes, I Accept Cookies