Security & Compliance

Founded by cyber security veterans, it is our top priority to go to infinity and beyond to protect the security and privacy of your data.

Rest assured -your data is safe!

Multi-Layer Architecture

Full Control & Visibility

SOC2 Type II & GDPR Ready

Full Privacy

End to End Encryption

Rest assured -
your data is safe!

SOC2 Type II
& GDPR Ready

Multi-Layer Architecture

Full Privacy

Full Control & Visibility

End to End
Encryption

How Unleash Secures Customer Data?

We want to instill confidence in you that we take this matter seriously and strive to be transparent about the ways we do so.

End to End Encryption

Any user data both in transit and at rest is encrypted with the latest and most advanced security protocols.    
Data at rest is protected using AES256 and TLS 1.3 is used for protecting data in transit.

Highest Class Data Center

Any data that we obtain is stored on our data centers, only. Our data centers are hosted on two cloud services providers, which are both best in their class, Amazon AWS & Microsoft Azure (Both are SOC II Type 2 complaint).  
 
All servers are protected inside a private network, beyond firewalls and VPN.

Access is limited to key personal only who have physical access to the office. 

You can view our data centre compliance pages via these links: 

Microsoft Azure Compliance Offerings

AWS SOC 3 Report

Development Process

The culture and internal development, operations, and DevOps processes at Unleash have been constructed to provide maximum data security, governed by external SOC II audit firm E&Y.    

Penetration Testing

As part of the process for receiving the SOC 2 Certificate, we regularly run penetration tests through external independent security firms, such as E&Y, to protect against any types of vulnerability.

*Our report is available upon request

Security-Orientated Environment

Adhering to best security practices, the strictest development processes and coding standards are employed at Unleash.

All R&D processes that are implemented and supported are done so with security as a top priority across all system layers.

Minimal Permissions

We request the minimal amount of permissions required to facilitate functionality when you connect an app to Unleash.

Control & Visibility

You and you alone decide which services to link to Unleash and what level of access to grant us.

*We do not ask or even request any passwords at all. All connections are done through OAuth1 and OAuth2 which are secured 3rd party authentication protocols.

Full Privacy

The contents of any users data cannot mistakenly or intentionally be viewed by Unleash employees. By company policy and technologically, we do not have the tools to query a users data or log in as a user.

*Your data belongs to you and only to you. We do not share or sell your personal info to any 3rd party or use it for any other purposes.

End to End Encryption

Any user data, both in transit and at rest, is encrypted with the latest and most advanced security protocols. Data at rest is protected using AES256, and TLS 1.3 is used for protecting data in transit.

Highest Class Data Center

Any data that we obtain is stored on our data centers, only. Our data centers are hosted on two cloud services providers, which are both best in their class, Amazon AWS & Microsoft Azure (both are SOC II Type 2 compliant).  
 
All servers are protected inside a private network, beyond firewalls and VPN. Access is limited to key personal only who have physical access to the office. 

You can view our data centre compliance pages via these links: 

Microsoft Azure Compliance Offerings

AWS SOC 3 Report

Development Process

The culture and internal development, operations, and DevOps processes at Unleash have been constructed to provide maximum data security, governed by external SOC II audit firm E&Y.    

Penetration Testing

As part of the process for receiving the SOC 2 Certificate, we regularly run penetration tests through external independent security firms, such as E&Y, to protect against any types of vulnerability.

*Our report is available upon request

Security-Oriented Environment

Adhering to best security practices, the strictest development processes and coding standards are employed at Unleash.

All R&D processes that are implemented and supported are done so with security as a top priority across all system layers.

Minimal Permissions

We request the minimal amount of permissions required to facilitate functionality when you connect an app to Unleash

Control & Visibility

You and you alone decide which services to link to Unleash and what level of access to grant us.

*We do not ask or even request any passwords at all. All connections are done through OAuth1 and OAuth2 which are secured 3rd party authentication protocols.

Full Privacy

The contents of any users data cannot mistakenly or intentionally be viewed by Unleash employees. By company policy and technologically, we do not have the tools to query a users data or log in as a user.

*Your data belongs to you and only to you. We do not share or sell your personal info to any 3rd party or use it for any other purposes.