This document is intended to give a broad overview of our security policies, processes and practices current at the date of writing. It would be impossible to describe all security controls in a document of this length, security policies change over time, and our own security policies prohibit the release of detailed information regarding our security practices. Download White Paper
IT security professionals of all types considering adopting cloud computing or 'Software as a Service' (SaaS) and question how secure their data will be in our hands. Customers are right to ask this question and should closely examine a vendor's security credentials.