Hosting & security
Reliability & availability
A proven track-record
Transparency to customers
Social media feeds
Backups
Transparency to our teams
Isolation
Recovery point objectives (RPOs)
DevOps best practices
Monitoring & on-call support
Data centers
Data location
Facilities
IT security
Physical security
Infrastructure & network security
Network controls
Incident management & response
Scanning
Encryption at rest & in transit
System administration
Third party risk management
Application security
Third-party penetration testing
DDoS mitigation
Responsible disclosure policy
Employees & internal IT
Information security policies & standards
Secure support protocols
Offices
Devices
Endpoints
Background checks
Business continuity
Product security features
Multi-factor authentication (MFA)
Secure credential storage
Brute-force protections
Approval workflows
IP restrictions
Single sign-on (SSO)
Email signing
Access permissions
Global publishing pause
Customer protection
Compliance & certifications