The topics of data protection and data security are more relevant than ever. MailMergic therefore does everything in its power to fully protect you and your documents from the most diverse dangers in the network.
Operational & device security
We develop and deploy infrastructure software using rigorous security practices. Our operations teams detect and respond to threats to the infrastructure from both insiders and external actors, 24/7/365.
Internet communication
Communications over the Internet to MailMergic are encrypted in transit. Our network and infrastructure have multiple layers of protection to defend us against Denial-of-service attacks.
Identity
Identities and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.
Storage services
Data stored in MailMergic is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.
Service deployment
Our application is deployed with security in mind. We don’t assume any trust between services, and we use multiple mechanisms to establish and maintain trust. Our infrastructure was designed to be multi-tenant from the start.
Hardware infrastructure
From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is controlled, secured, built, and hardened by us.