Secure SaaS Backup

Secure Data Protection for Microsoft 365, Google Workspace, Salesforce, Box and Dropbox
Security SaaS Backup | CloudAlly
dotted_horizontal_divider

Compliant, Secure and Audit-Ready

Your valuable SaaS data is only as secure as its backup. Which is why it is critical to ensure that your backup solution is dependably secure.

Security has been in our DNA since we pioneered SaaS backup in 2011. We’re fanatical about security for all our backup solutions for Microsoft 365 (Office 365), Google WorkspaceSalesforce, Dropbox, and Box. We have internationally recognized accreditation, stringent application security, and rigorous data protection. We continue to strive beyond the required compliance standards to achieve best-in-class security.

Is Your SaaS Backup Secure? 

Consult with our

Security Expert

Security Datasheet - Download

Secure Cloud Backup | CloudAlly
dotted blue horizontal line | CloudAlly

Stringently Compliant

ISO 27001 certified

CloudAlly is ISO 27001 certified which is an internationally recognized accreditation for information security management. 

HIPAA COMPLIANT and member of the Cloud Security Alliance (CSA)

We are HIPAA compliant and can provide a BAA Agreement on request. We also participate in the Cloud Security Alliance STAR (Security, Trust and Assurance Registry) program using CSA’s Cloud Controls Matrix (CCM).

GDPR | CloudAlly

We’re committed to ensuring that our services are fully compliant with GDPR. Our GDPR compliance includes adherence to its data sovereignty, data security, and data processing requirements, among others. Read more about our GDPR compliance.

Data Centers in the U.s, EU, U.K. or APAC

Adhere to local regulatory requirements with your choice of data centers across the US, Canada, Europe (France, Germany, and Ireland), the UK, Africa (South Africa) and Asia Pacific (Australia and Japan). Or backup to your own storage with Bring Your Own Storage (BYOS) support.

Best-in-class Application Security and Access

reliable amazon hosting | CloudAlly

Reliable Amazon Hosting

CloudAlly is hosted on Amazon Web Services (AWS) S3 data storage, the leading cloud storage provider, which means that we’ve built CloudAlly on a foundation of reliable security right from the beginning. This also ensures high availability during MS 365, Google Workspace, Salesforce, Box, and/or Dropbox downtime

secure authentication | CloudAlly

Secure MFA/2FA Authentication and SAML-Okta Integration

Our solutions implement application security best practices, such as Two Factor Authentication (2FA), robust password protection, password and access key rotation, and vulnerability and patch management. We also support Okta and OAuth integration.
intrusion detection | CloudAlly

Intrusion Detection and IP Restriction

Virtual private cloud, identity, and access management, stateful and stateless firewalls, application-level firewalls, and intrusion detection further strengthen the security of our solutions.

Get multi-admin support with fine-grained access management per admin. Prevent unauthorized access with IP restriction support.

certified | CloudAlly

Certified by Google, GoDaddy, and others...

Our websites have  Secure Security Authorization (HTTPS) SSL Certificates issued by GoDaddy. We’re certified by solution providers such as Google Workspace formerly known as G Suite, and others.   

Rigorous Data Protection

data encryption | CloudAlly

Data Encryption in-transit and at rest

All data is stored in Amazon S3 storage and encrypted using advanced AES-256 bit encryption algorithms. Transmitted data is encrypted and secured using SSL (HTTPS) enabled servers.

Our servers are strongly secured, hardened and include the latest security patches. All end-user sessions and interactions with the CloudAlly backup solution use SSL/HTTPS. 

Comply with data regulations with support for Salesforce data anonymization for Sandbox Seeding.

encryption key management | CloudAlly

Encryption Key Management

CloudAlly uses a unique encryption key for each customer, and the keys are securely stored. Use of a unique S3 folder for each customer ensures data isolation. Additionally, every backup task has its own initial vector stored securely and separately from the user key. This technique helps CloudAlly to encapsulate the users’ data. 

Immutable Storage – our Object-Lock capability further minimizes the possibility of accidental or malicious data loss. 

auth permission | CloudAlly

OAuth/SAML-Okta Permissioning

CloudAlly uses industry-standard OAuth for permission-based access when possible, eliminating the need to enter or store user credentials on the CloudAlly system. The OAuth “token” limits access to precisely what CloudAlly needs to do and doesn’t provide general access to your account. You can revoke authorization at any time.

We also support SAML authentication via the leading industry provider Okta in addition to OAuth for secure authentication.

Customer has Full Control of Data

admin controlled backups | CloudAlly

Admin-controlled backups

Customer backup data is not accessible directly, it can only be accessed using the CloudAlly platform. CloudAlly backups can only be activated, deactivated or restored by the customer’s Data Administrator. Internal CloudAlly staff do not have access to customer data, and only a limited number of core team members have access to production keys based on a “need to know” policy for problem resolution, and all access is logged in the audit log.
no data retention after deletion | CloudAlly

No Data Retention after Deletion

All backup data is retained as long as you maintain your CloudAlly subscription. If you choose to cancel your subscription, your data will be deleted from the CloudAlly archives within 5 Days. If you deactivate an individual user backup or database table/domain, that data will be deleted within 24 hours so we recommend downloading the data prior to deactivation if you want to retain the backed up data for local archiving. 
data privacy | CloudAlly

Data Privacy by Design

CloudAlly backups are stored in your choice of AWS  data centers in US, Canada, Europe (France, Germany, and Ireland), the UK, Africa (South Africa) and Asia Pacific (Australia and Japan) as needed for compliance with data sovereignty directives. Or choose to Bring Your Own Storage (BYOS).

payment process | CloudAlly

Payment Processing

Payment processing, including credit card information, is hosted by our payment processor which is fully PCI compliant. No payment information is handled or stored on the CloudAlly system.

Security Built into Our Product DNA

For a product to be robustly secure security has to be built into the SDLC (Software Development Lifecycle). Security has to form the bedrock of company culture and credentials have to be independently evaluated.

CloudAlly’s Secure SDLC

Our Culture of Security

In the design phase — CloudAlly’s security team reviews all product design and requirement documents to identify any risks early in the development process.

CloudAlly maintains a comprehensive employee on-boarding process, including a device management solution to all laptops, encrypting hard disks, enabling firewalls, and implementing a VPN.

In the development phase — We integrate security tools into the process that run whenever code is committed to detect any vulnerabilities.

All new hires are subject to a pre-employment background check in order to verify identity, references, and criminal history.

In the testing/release phase — We perform penetration testing on our product and test extensively to detect potential vulnerabilities prior to deployment.

We require all new employees to complete a comprehensive security awareness training, and we conduct annual training to maintain continued awareness.

dotted_horizontal_dividerDARKBLUE-02

CloudAlly's Validated Secure Credentials

Stringently secure, audit-ready, and compliant

CloudAlly conducts periodical penetration tests, in order to identify vulnerabilities in our web application/s with other integrations. We collaborate with an Independent Security Evaluator (ISE) to perform network, cloud, and application penetration testing and vulnerability testing.

CloudAlly stands fast in its commitment to seeking out the latest and most innovative ways to stay ahead of potential threats to your data. This is our method of promising our customers that we’re always vigilant so that you can feel safe entrusting us with your business critical data. We know that’s what the market has come to expect from us, and that’s why we hold ourselves to the highest security standards possible.

ISO Certified | CloudAlly
ISO 27001
Compliant
AWS logo | CloudAlly
Built on Amazon
Web Service (AWS)
HIPAA | CloudAlly
HIPAA
Compliant

Strong
Encryption

Global
Datacenters

Intrusion
Detection

Compartmentalized
Access

99.99%
Uptime

Virtual
Private Cloud

UE-EU Privacy
Shield Certified

Our Customers
RAMVIK | CloudAlly
SHM logo | CloudAlly
JAG logo | CloudAlly
BCG logo | CloudAlly
SCH logo | CloudAlly
LWB logo | CloudAlly
Secure SaaS backup | CloudAlly

7 Reasons Why Enterprises Need SaaS Backup And Pointers to Maximize Its ROI.

In our eBook you will find 7 Reasons Why Enterprises Need to Secure SaaS Backup And Pointers to Maximize Its ROI.

Learn About:

    • The Business Case for Cloud Backup
    • Pointers to Save on Backup
    •  … & much more.