Secure SaaS Backup
Compliant, Secure and Audit-Ready
Your valuable SaaS data is only as secure as its backup. Which is why it is critical to ensure that your backup solution is dependably secure.
Security has been in our DNA since we pioneered SaaS backup in 2011. We’re fanatical about security for all our backup solutions for Microsoft 365 (Office 365), Google Workspace, Salesforce, Dropbox, and Box. We have internationally recognized accreditation, stringent application security, and rigorous data protection. We continue to strive beyond the required compliance standards to achieve best-in-class security.
Is Your SaaS Backup Secure?
Stringently Compliant
ISO 27001 certified
CloudAlly is ISO 27001 certified which is an internationally recognized accreditation for information security management.
HIPAA COMPLIANT and member of the Cloud Security Alliance (CSA)
We are HIPAA compliant and can provide a BAA Agreement on request. We also participate in the Cloud Security Alliance STAR (Security, Trust and Assurance Registry) program using CSA’s Cloud Controls Matrix (CCM).
We’re committed to ensuring that our services are fully compliant with GDPR. Our GDPR compliance includes adherence to its data sovereignty, data security, and data processing requirements, among others. Read more about our GDPR compliance.
Data Centers in the U.s, EU, U.K. or APAC
Adhere to local regulatory requirements with your choice of data centers across the US, Canada, Europe (France, Germany, and Ireland), the UK, Africa (South Africa) and Asia Pacific (Australia and Japan). Or backup to your own storage with Bring Your Own Storage (BYOS) support.
Best-in-class Application Security and Access
Reliable Amazon Hosting
CloudAlly is hosted on Amazon Web Services (AWS) S3 data storage, the leading cloud storage provider, which means that we’ve built CloudAlly on a foundation of reliable security right from the beginning. This also ensures high availability during MS 365, Google Workspace, Salesforce, Box, and/or Dropbox downtime
Secure MFA/2FA Authentication and SAML-Okta Integration
Intrusion Detection and IP Restriction
Virtual private cloud, identity, and access management, stateful and stateless firewalls, application-level firewalls, and intrusion detection further strengthen the security of our solutions.
Get multi-admin support with fine-grained access management per admin. Prevent unauthorized access with IP restriction support.
Certified by Google, GoDaddy, and others...
Our websites have Secure Security Authorization (HTTPS) SSL Certificates issued by GoDaddy. We’re certified by solution providers such as Google Workspace formerly known as G Suite, and others.
Rigorous Data Protection
Data Encryption in-transit and at rest
All data is stored in Amazon S3 storage and encrypted using advanced AES-256 bit encryption algorithms. Transmitted data is encrypted and secured using SSL (HTTPS) enabled servers.
Our servers are strongly secured, hardened and include the latest security patches. All end-user sessions and interactions with the CloudAlly backup solution use SSL/HTTPS.
Comply with data regulations with support for Salesforce data anonymization for Sandbox Seeding.
Encryption Key Management
CloudAlly uses a unique encryption key for each customer, and the keys are securely stored. Use of a unique S3 folder for each customer ensures data isolation. Additionally, every backup task has its own initial vector stored securely and separately from the user key. This technique helps CloudAlly to encapsulate the users’ data.
Immutable Storage – our Object-Lock capability further minimizes the possibility of accidental or malicious data loss.
OAuth/SAML-Okta Permissioning
CloudAlly uses industry-standard OAuth for permission-based access when possible, eliminating the need to enter or store user credentials on the CloudAlly system. The OAuth “token” limits access to precisely what CloudAlly needs to do and doesn’t provide general access to your account. You can revoke authorization at any time.
We also support SAML authentication via the leading industry provider Okta in addition to OAuth for secure authentication.
Customer has Full Control of Data
Admin-controlled backups
No Data Retention after Deletion
Data Privacy by Design
CloudAlly backups are stored in your choice of AWS data centers in US, Canada, Europe (France, Germany, and Ireland), the UK, Africa (South Africa) and Asia Pacific (Australia and Japan) as needed for compliance with data sovereignty directives. Or choose to Bring Your Own Storage (BYOS).
Payment Processing
Payment processing, including credit card information, is hosted by our payment processor which is fully PCI compliant. No payment information is handled or stored on the CloudAlly system.
Security Built into Our Product DNA
For a product to be robustly secure security has to be built into the SDLC (Software Development Lifecycle). Security has to form the bedrock of company culture and credentials have to be independently evaluated.
CloudAlly’s Secure SDLC
Our Culture of Security
In the design phase — CloudAlly’s security team reviews all product design and requirement documents to identify any risks early in the development process.
CloudAlly maintains a comprehensive employee on-boarding process, including a device management solution to all laptops, encrypting hard disks, enabling firewalls, and implementing a VPN.
In the development phase — We integrate security tools into the process that run whenever code is committed to detect any vulnerabilities.
All new hires are subject to a pre-employment background check in order to verify identity, references, and criminal history.
In the testing/release phase — We perform penetration testing on our product and test extensively to detect potential vulnerabilities prior to deployment.
We require all new employees to complete a comprehensive security awareness training, and we conduct annual training to maintain continued awareness.
CloudAlly's Validated Secure Credentials
CloudAlly conducts periodical penetration tests, in order to identify vulnerabilities in our web application/s with other integrations. We collaborate with an Independent Security Evaluator (ISE) to perform network, cloud, and application penetration testing and vulnerability testing.
CloudAlly stands fast in its commitment to seeking out the latest and most innovative ways to stay ahead of potential threats to your data. This is our method of promising our customers that we’re always vigilant so that you can feel safe entrusting us with your business critical data. We know that’s what the market has come to expect from us, and that’s why we hold ourselves to the highest security standards possible.
Compliant
Web Service (AWS)
Compliant
Strong
Encryption
Global
Datacenters
Intrusion
Detection
Compartmentalized
Access
7 Reasons Why Enterprises Need SaaS Backup And Pointers to Maximize Its ROI.
In our eBook you will find 7 Reasons Why Enterprises Need to Secure SaaS Backup And Pointers to Maximize Its ROI.
Learn About:
- The Business Case for Cloud Backup
- Pointers to Save on Backup
- … & much more.