Security policy
We take security seriously here at Overloop, and we are proud to exceed the industry standard when it comes to protecting your organization.
Infrastructure
All of our services run in the cloud. We don’t host or run our own routers, load balancers, DNS servers, or physical servers. Our service is built on Heroku (Salesforce, Inc.) which itself is hosted on Amazon Web Services (AWS). They provide strong security measures to protect our infrastructure and are compliant with most certifications. You can read more about their practices here and here.
Security features
-
DDoS attack protection
We use a fast, globally distributed and intelligent always-on DDoS protection powered by Cloudflare, Inc.
-
Data encryption in transit
All data sent to or from our infrastructure is encrypted in transit following industry best-practices using TLS. You can see our SSLLabs report here.
-
Data encryption at rest
All our user data (including passwords) is encrypted using battled-proofed encryption algorithms in the database by our database providers Heroku (Salesforce, Inc.) and Redis Labs, Inc.
-
Custom data removal
We retain our users data for a period of 60 days after their subscription ends. All data is then completely removed from our servers with the exception of payment and invoices data. Every user can request the removal of usage data by contacting support.
-
Disaster recovery
We back up all our critical assets and regularly attempt to restore the backup to guarantee a fast recovery in case of disaster. All our backups are encrypted.
-
Application security monitoring
We use Bugsnag to monitor exceptions, logs and detect anomalies in our applications. We collect and store logs to provide an audit trail of our applications activity.
-
Application security protection
- A WAF is set up to filter incoming requests trying to compromise the service.
- A firewall is systematically used on Overloop’s servers to prevent access from non-approved IP addresses.
- Critical admin interfaces are protected using at least double-authentication.
- Our software infrastructure is regularly update using automatic update mechanisms when possible.
- End-to-end encrypted messaging systems are available to Overloop’s employees and contractors, and used for most communications.
-
Secure development
We apply development best practices to mitigate known vulnerability types such as those on the OWASP Top 10 Web Application Security Risks.
-
Payment processing
All payment processing is outsourced to Stripe which is certified as a PCI Level 1 Service Provider. We don’t collect any payment information and are therefore not subject to PCI obligations.
-
Restricted data access
Our strict internal procedure prevents any employee from gaining access to user data. Limited exceptions can be made for customer support.
Vulnerability disclosure program
No technology is perfect, and we believe that working with skilled security researchers across the globe is crucial in identifying weaknesses in Overloop. If you believe you’ve found a security issue in our product, we encourage you to notify us and welcome working with you to resolve the issue promptly.
Have further questions about our approach to security and how we protected your data?
Contact Us