Each team member undergoes comprehensive training on data security protocols. Only a limited number of staff members can access customer data. Our support staff will not look at your data unless you request assistance. All information, data and documents exchanged with our support staff is treated as confidential and will not be disclosed.
Our services run on Microsoft’s Azure and Amazon's AWS cloud platforms. We do not run any on-premise routers, load-balancers, DNS servers, or physical servers. Our infrastructure is spread across at least two data centers based in the United States and will continue to work in the event of the complete failure of an underlying data center. Our servers are updated on a regular basis to ensure we have the latest software and security patches installed. Roots Automation’s databases have both high availability and backup mechanisms.
We use end-to-end bank level encryption. Additional protections are layered together whenever we send or retrieve data from your systems or from the Roots Cockpit, the communication is always secured through HTTPS encryption. Next to encrypting data in transit, we also encrypt all data at rest. Our databases, as well as all stored data and documents, are encrypted from the moment we receive your data until deleted. Your login details are one-way hashed using a strong hashing algorithm. Not even our staff can see or access your password.
We have uptime of 99.9% or higher.
Roots Automation is tested for security issues on a regular basis by independent security researchers. In pursuit of the best possible security for our service, we welcome responsible disclosure of any vulnerability found in Roots Automation (firstname.lastname@example.org).