Security

Web & Mobile App

Redlist user’s trust and rely on Redlist 24/7/365 to run multiple departments and millions of tasks every day. That is why we proactively safeguard our users to ensure they have safe reliable access to their data.  

Your Security is Mission Critical

We use industry-leading standards to secure, transfer and store user’s data. We strictly follow SOC-2, ISO 2007 and other standards to ensure all data within Redlist is secure and protected. 

Built On a Secure Foundation

Redlist is built using the Microsoft Azure multi-layered security platform to ensure the highest level of data security. With robust encryption and cyber security infrastructureusers can rest easy knowing that their data is safe. 

Real-time Backups

Client data is backed up in real time. In the event of data corruption and can be restored to any point in time with plus or minus 5 minutes of precision (within the last 5 weeks) in the event of data corruption. Outside of the 5-week window backups precision decreases exponentially (ie. only daily, weekly or monthly backups may be available)

Data Encryption

All data within Redlist is safeguarded by AES 256-bit encryption at rest as well as in transit. Ensuring no one can access the data that helps run your business. We also use standard TLS 1.2 to aid in the secure transfer of information between your device and our servers. 

Geo-redundant Replicas

Redlist proactively creates encrypted real-time geo-redundant replicas of every database that allow for real-time fault tolerance. Ensuring that your system is up and running regardless of natural disaster.

Other Security Features

Auto Idle Logout

Redlist uses automated logout features that prevent unwanted users from accessing your account after you have left your computer.

Logs

We use detailed logs to help us continually track the performance of the system and proactively fix issues that the system may encounter.

Internal Security

Only required Redlist personnel are able to view and access your database to ensure your private information is protected.

Mobile App & API

Mobile App Security

Data transferred from our mobile apps is sent using the https protocol over our secure API. Learn more about the security of our mobile app on the App Store and Google Play Store.

RESTful API

For Sensor Connections, we use a unique API key that is securely stored within a digital vault.

Strong Software Architecture

View our architecture

Built Using the Platform Trusted By

Redlist Security FAQ

SaaS is a type of software delivery that gives the user the ability to access data from any device with an internet connection and web browser or through offline modeIn this software model the vendor (Redlist) hosts and maintains the servers, database, and the code that makes up the application.  

Yes, at Redlist everyone understands the importance of security for our customers. We take strong steps to make sure that we are in line with industry-standard practices. Including, SOC-2 and ISO 2007. 

Yes, All data within the Redlist application utilizes AES 256 encryption at rest as well as in transit. 

Yes, all Redlist data is held in geo-redundant locations. This allows our customers to access their data even if a server or database location is destroyed during a natural disaster. 

Have ideas or feedback?

Submit Feedback