Our systems are built on industry-leading security practices, ensuring solid protection and transparency for your business and clients’ data so you can trust Guardz with your security.
“Security is at the core of everything we do. We care deeply about our customers’ data so much so that we consider it at every stage of our development, both within our product and as a company as a whole.
Our focus is on maintaining a proactive security approach, ensuring our customers and their clients are always protected.”
Esther Pinto
| CISO
“Security is at the core of everything we do. We care deeply about our customers’ data so much so that we consider it at every stage of our development, both within our product and as a company as a whole. Our focus is on maintaining a proactive security approach, ensuring our customers and their clients are always protected.”
At Guardz, we don’t compromise when it comes to Security & Privacy. Our commitment is to maintaining customer data with the utmost care and efficiency. This represents our devotion to upholding the highest standards of security & confidentiality, serving as a protective framework and proof of a trusted, strong, and secure potential partner.
Guardz ensures the security of data during all transit stages using TLS v1.2/1.3 encryption and AES-256 encryption for data at rest.
In addition, we regularly back up data and perform risk assessments both internally and with third parties.
Guardz protects sensitive data with a least-privilege model, strict password policies, MFA, SSO, and access logging. Access to the product environment is strictly limited to authorized personnel via a secure, authenticated tunnel.
Guardz takes application security as a primary focus, conducting regular scanning, vunerability & penertration testing including SAST, SCA, and following OWASP guidelines for web application architecture
Guardz is a reliable and secure SaaS platform, built on industry best practices. Infrastructure security is achieved through continuous monitoring, restricted access and logical tenant separation.
Guardz hosts its data on GCP both in US and in Europe. These providers ensure the highest levels of security, scalability, and availability to meet our customers’ needs.
Guardz employs end-to-end encryption for data both in transit and at rest, using industry-standard protocols such as TLS 1.2 and above for transmission and AES-256 for data storage. Additionally, all sensitive data is access-controlled and encrypted within our systems to prevent unauthorized access.
Guardz is committed to maintaining the highest security standards and complies with a variety of industry-recognized certifications and frameworks, including SOC 2 Type II, GDPR, and CCPA. We regularly undergo independent audits to ensure compliance.
Guardz implements multi-factor authentication (MFA) for all user access, along with strong password policies and role-based access control (RBAC) to ensure that only authorized personnel can access sensitive systems and data. We also utilize identity federation with trusted providers for secure login and session management.
In the event of a suspected data breach, Guardz follows an established incident response protocol that includes immediate containment, investigation, and notification. We will inform affected parties promptly, comply with legal reporting obligations, and implement corrective actions to prevent recurrence. Our security team works around the clock to ensure that any potential breach is handled with the utmost care and transparency.
Guardz secures its infrastructure through a multi-layered approach, leveraging firewalls, intrusion detection systems, and continuous monitoring to safeguard cloud environments. We conduct regular vulnerability assessments and penetration testing to identify and mitigate potential security risks. Our security team also applies timely patches and updates to address known vulnerabilities.
Guardz uses Guardz’s security awareness training for all employees. This includes regular training sessions on identifying phishing attempts and following organizational security policies. We also conduct simulated attacks to test employee readiness and improve awareness, all while using our own product.
Guardz follows a thorough vendor risk management process, evaluating third-party vendors for their security posture before onboarding them. We require that all vendors meet specific security and compliance standards, and we regularly assess their security practices through audits and reviews. This ensures that any third-party interactions do not compromise our customers’ data.
Guardz retains customer data only for as long as necessary to fulfill our contractual obligations and comply with applicable legal requirements. Data retention periods vary depending on the type of data, but we ensure that data is securely deleted when no longer needed.
Guardz is committed to protecting customer privacy and ensuring compliance with data protection laws such as GDPR, CCPA, and other relevant privacy regulations. We implement strict data access controls, conduct regular privacy audits, and adhere to privacy-by-design principles to protect personal data from collection to disposal
We’re committed to protecting your data with the highest security standards.
Read our Privacy Policy to see how we keep your information safe.
Get a Personalized Walkthrough with a Cyber Expert
Dive into the crucial e-mail security protocols (SPF, DKIM, DMARC) to enhance your e-mail protection and make sure your e-mails are delivered in the inbox of your recipients instead of the spam or quarantine folder.
Download Now