Web & Mobile App
Software Details & Security
Redlist user’s trust and rely on Redlist 24/7/365 to run multiple departments and millions of tasks every day. That is why we proactively safeguard our users to ensure they have safe reliable access to their data.
Your Security is Mission Critical
We use industry-leading standards to secure, transfer and store user’s data. We strictly follow SOC-2, ISO 2007 and other standards to ensure all data within Redlist is secure and protected.
Built On a Secure Foundation
Redlist is built using the Microsoft Azure multi-layered security platform to ensure the highest level of data security. With robust encryption and cyber security infrastructure, users can rest easy knowing that their data is safe.
Client data is backed up in real time. In the event of data corruption and can be restored to any point in time with plus or minus 5 minutes of precision (within the last 5 weeks) in the event of data corruption. Outside of the 5-week window backups precision decreases exponentially (ie. only daily, weekly or monthly backups may be available)
All data within Redlist is safeguarded by AES 256-bit encryption at rest as well as in transit. Ensuring no one can access the data that helps run your business. We also use standard TLS 1.2 to aid in the secure transfer of information between your device and our servers.
Other Security Features
Mobile App & API
Built Using the Platform Trusted By
Redlist Security FAQ
SaaS is a type of software delivery that gives the user the ability to access data from any device with an internet connection and web browser or through offline mode. In this software model the vendor (Redlist) hosts and maintains the servers, database, and the code that makes up the application.
Yes, at Redlist everyone understands the importance of security for our customers. We take strong steps to make sure that we are in line with industry-standard practices. Including, SOC-2 and ISO 2007.
Yes, All data within the Redlist application utilizes AES 256 encryption at rest as well as in transit.
Yes, all Redlist data is held in geo-redundant locations. This allows our customers to access their data even if a server or database location is destroyed during a natural disaster.