Security is central to the work we do. Here’s how we handle the data we’re entrusted with. Please contact us with any questions.

Data in Transit

CleryEdge uses 256-bit TLS encryption so that as you share data back and forth with CleryEdge, your transmissions are secure. This is the same level of encryption used by banks and all other processors of highly-sensitive data.

Data at Rest

All CleryEdge data is stored using several layers of encryption. Stored data is split into chunks, with each chunk encrypted by a unique data encryption key. These keys are stored with the data, wrapped by further encryption keys which are stored in specific and highly secured-service which is redundant and globally distributed. All CleryEdge data is encrypted using either AES256 or AES128.

Tokenization

CleryEdge never touches sensitive credit-card data, either for our paying customers or for our invoice payment features. Though CleryEdge presents forms for credit card entry seamlessly using partners, all credit card information is handled entirely by our payment processing service, which maintains the highest level of PCI-DSS compliance.

Security Testing

We regularly test for vulnerabilities using both internal and external resources. Any potential security vulnerabilities we find are escalated for immediate investigation and take priority over all other engineering tasks.

Physical Data Center Security

The data centers used by CleryEdge feature a layered security model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics. The data center floor features laser beam intrusion detection. The data centers are monitored 24/7 by high-resolution interior and exterior cameras that can detect and track intruders. Access logs, activity records, and camera footage are reviewed in case an incident occurs. Data centers are also routinely patrolled by experienced security guards who have undergone rigorous background checks and training.

Data Loss Prevention

We keep regular backups of our data. Though we’ve never suffered a data loss event, backups are kept on a rolling basis and destroyed at a later time according to our data retention policy.

User Access Control

You determine who has access to your data by setting permissions for your CleryEdge users. Visit our Help Center to find out more information on adding and setting user permissions.