Really Good Data Security and Customer Data Management
Discover how Really Good Data prioritizes security and customer data management. Learn about our robust measures, encryption protocols, and data integrity practices for a safe and trusted marketing automation experience.
Does Really Good Data monitor its systems and software?
Yes! We monitor 24x7x365 using proprietary and industry-recognized solutions. Additionally, because Really Good Data is built on the Microsoft Azure Cloud we also benefit from additional infrastructure oversight provided by Microsoft.
What is Really Good Data’s availability?
Really Good Data’s availability is consistently above 99.99%. Customer data is backed up to multiple sources with both full and rolling partial backups.
What if something isn’t working as expected?
If something doesn’t seem to be working as expected, you can contact us and we will investigate.
Is Really Good Data’s system redundant?
Really Good Data runs multiple independent instances of the software hosted in regions best suited for our customers. The instances are all run in the Microsoft Azure Cloud and all databases, application servers, web servers, jobs servers, and load balancers as well as backend support services all have multiple failover instances to prevent outage from single points of failure.
Does Really Good Data encrypt data in transit?
Yes! All sessions, whether web sessions or API sessions, are always protected with top end in-transit encryption TLS 1.2 protocols, and 2,048-bit keys.
Can I use SSL (TLS) on my Really Good Data-hosted domain?
Yes! We strongly encourage and recommend using TLS for any domains we host for our customers. To add a certificate for your domain, please contact us.
Is my data protected by a web application firewall and network firewall?
Yes! Really Good Data prevents attacks with a high-grade web application firewall and network-level firewalls.
Is security incorporated into Really Good Data’s software development lifecycle?
Yes! Really Good Data uses security best practices during our software development lifecycle. This includes automated testing and human code reviews. Our automated software processes enable us to push out bug fixes, improvements, and new features daily.
Are physical security protections in place to protect customer data?
Yes! Really Good Data products are hosted in Microsoft’s Azure Data Centers. Access to these data centers is monitored and controlled with security staff, video monitoring, and visitor auditing. Read more about Azure Data Center Security.
Are geographically diverse data centers used?
Yes! With more than 100 secure facilities worldwide Microsoft Azure provides Really Good Data with a diverse set of geographic data centers. Really Good Data is designed as an instance based application. With multiple instances running across multiple data centers this provide isolation and enables instances to run in our customer geography.
Does Really Good Data respond quickly to new security needs or threats?
Yes! Really Good Data can rollout new updates or revert to previous versions very quickly across the entire system or on an instance-by-instance basis. Really Good Data’s applications are constantly monitored and our security team is notified of any unusual activity. For enterprise customers running in dedicated instances, Really Good Data provides additional measures such as IP blocking.
Does the Really Good Data infrastructure detect and prevent attacks?
Yes! Really Good Data uses Microsoft Azure’s firewalls, routing, and intrusion prevention to protect our customers from attacks.
Does Really Good Data rapidly patch and update when vulnerabilities are identified?
Yes! Microsoft Azure maintains all patching of platform software – operating systems, databases, and so on – Really Good Data’s patch management process is part of the application development lifecycle and patches can be rolled out rapidly.
Does Really Good Data have an incident response program?
Yes! Really Good Data’s incident response framework is an established pattern for root cause analysis, documentation, and future prevention.
Does Really Good Data perform penetration analysis?
Yes! In addition to test automation, Really Good Data’s testing team routinely performs penetration analysis on Really Good Data’s application.
Can I get involved in security testing the Really Good Data products?
Yes! Please contact us about our bounty program.
What external audits or assessment results are available to review?
Many! Microsoft Azure Data Centers maintain ISO 27001, SOC 1, SOC 2, SOC3, and many other certifications.