Security Overview

Last updated: January 30, 2019

The security of our customers personal information is very important for us. We use robust security measures, which encompass both technical and organizational security controls, to prevent data loss, information leaks, or other unauthorized data processing operations. Baltsoft incorporates encryption, incident management, network and system integrity, and availability and resilience requirements into its security program. Learn more about our security policy, methodology and secure infrastructure by reviewing our security statement below.


Key facts about our security policy and server infrastructure

24/7 Proactive Monitoring

All our systems are continuously monitored for security, availability and performance.

Professional Data Centers

We exclusively use leading data center providers with excellent physical security controls.

High Availability

Full redundancy of all important systems and world-class data connectivity.

SSL/HTTPS Encryption

Communication with our servers is securely encrypted using SSL, HTTPS and TLS.

System & Data Backups

All our systems are regularly backed up for disaster recovery and system outages.

Database Isolation

Separation of customer data with database-level isolation and access permissions.

Automatic Updates

Benefit from full maintenance with automated system and application updates.

Data Protection

We are bound to the very strict German and European data protection laws.

Access Permissions

Fine-grained access control via system permissions, roles and network addresses.


ConvertAPI now 100% based on IBM Cloud with full compliance

All new ConvertAPI Cloud accounts are now 100% based on our new IBM Cloud backed infrastructure, following many industry best practices and using IBM's fully compliant and certified systems.

All our systems are designed with pro-active failover across multiple data centers in the US, EU, ASIA and South America, while complying with the strict EU data protection rules guaranteed under IBM's Safe Harbor compliance.

IBM Cloud has certified their infrastructure and/or is compliant with many industry standard policies under the IBM Assurance Program such as ISO, PCI DSS, SOC, FIPS and MPPA.


What we're doing to keep your data and our infrastructure
safe and to ensure fast and effective responses to security issues.

Methodology

The security and safety of customer data, our applications and the supporting infrastructure is our top priority. We achieve a high level of security by following many industry best practices and regularly reviewing and improving our security policies and processes.

Our staff is trained and briefed to ensure that our security policy is executed thoroughly across all disciplines and teams, including customer service, our software development team as well as infrastructure operations.

Physical Security

Our servers are hosted exclusively at professionally maintained and secured facilities from leading data center providers. All facilities feature various physical security mechanisms such as electronic access control systems, 24/7 monitoring of entrances, server rooms and vehicle access roads, as well as modern fire detection and UPS systems.

Vulnerability Management

Our applications and the supporting infrastructure are frequently reviewed for potential security issues.

Our documented disclosure policy and our vulnerability management ensure efficient and fast responses to security issues and incidents.

Network Security

Our network is protected by redundant firewalls and load balancers. Our data center providers employ additional constant performance and security monitoring of the used infrastructure. We monitor all systems 24/7 for availability and performance related incidents to pro-actively troubleshoot and resolve issues. Many of our servers and network equipment are designed in a redundant way with automatic active failover.

Transmission Security

All communications with ConvertAPI cloud instances or our customer portal are encrypted using industry standard SSL and HTTPS. For email, our infrastructure supports TLS, a protocol that encrypts and delivers email securely between servers. The ConvertAPI server edition also supports SSL for the application as well as email delivery. The use of SSL is also supported and encouraged for integrations with third-party systems.

Access Control

All access to data within ConvertAPI is governed by access rights and user authentication. Operations and customer service policies follow many industry best practices to limit access to customer data. Additionally, customers can restrict access to ConvertAPI users based on various permissions, roles and network addresses.

Application Security

Our applications feature robust security mechanisms and use or support encrypted storage of select data as well as backups and hashed passwords if applicable.

Development Practices

Our teams follow many industry best practices to achieve a high level of security in our code and infrastructure. To ensure a high code quality, we employ regular code reviews, track changes rigorously and train team members on common relevant attack vectors. We also maintain our own secure framework as part of our stack to limit third-party dependencies and to manage critical code in a central place.

Data Isolation

We isolate customer data for ConvertAPI server and cloud instances by using separate databases and user access for each customer. This and additional mechanisms ensure protection of sensitive customer information on the database level.

Privacy

We are bound to the very strict Lithuanian and European data protection laws such as the Lithuanian Law on Legal Protection of Personal Data and the General Data Protection Regulation (“GDPR”).

To learn more about our commitment with GDPR, please visit our GDPR webpage. Personal information and customer data is stored and processed only to provide and optimize our applications, services and offerings.