Thousands of companies and marketers around the world trust Post Affiliate Pro with their data. Data security is of utmost importance for us. We combine multiple security features to ensure customer, employee and business data is always protected so our customers can rest easy knowing their data is safe, their communication is secure, and their businesses are protected.
All Post Affiliate Pro hosted accounts run over a secure connection using the HTTPS protocol. Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. It means all communication between your browser and Post Affiliate Pro is encrypted, including your chat and email communication.
Secure credential storage
We follow latest best practices to store and protect user login credentials and passwords in the cloud.
Post Affiliate Pro API is restricted to accredited users based on username and password or username and API tokens.
We ensure the confidentiality and integrity of your data with industry best practices. Post Affiliate Pro servers are hosted at Tier IV or III+, PCI DSS, SSAE-16, or ISO 27001 compliant facilities. Our Security Team constantly pushes security updates and actively responds to security alerts and events.
Post Affiliate Pro servers are hosted at Tier III+ or IV or PCI DSS, SSAE-16, or ISO 27001 compliant facilities. Data center facilities are powered by redundant power, each with UPS and backup generators.
|On-site security||Security zones|
Our data center facilities feature a secured perimeter with multi-level security zones, 24/7 manned security, CCTV video surveillance, multifactor identification with biometric access control, physical locks, and security breach alarms.
|Monitoring||Server & device monitoring|
All Production Network systems, networked devices, and circuits are constantly monitored and logically administered by Post Affiliate Pro administrators. Physical security, power, and internet connectivity beyond co-location cage doors or Amazon/Linode services are monitored by the facilities providers.
|Location||Datacenters in United States, Europe & Asia|
Post Affiliate Pro hosts data in multiple data centers based on your preference or geographical location in the United States, Europe, and Asia. Customers can choose to locate their Service Data in the US-only or Europe-only.
Our network is protected by redundant firewalls, best-in-class router technology, secure HTTPS transport over public networks, and network Intrusion Detection and/or Prevention technologies (IDS/IPS) which monitor and/or block malicious traffic and network attacks.
|Architecture||Security zones in our architecture|
Our network security architecture consists of multiple security zones. More sensitive systems, like application servers and database servers, are protected in our most trusted zones. Other systems like loadbalancers are housed in zones commensurate with their sensitivity, depending on function, information classification, and risk.
|3rd-party penetration tests||Third-party security research|
In addition to our extensive internal scanning and testing program, Post Affiliate Pro also works with third-party security experts and researchers to perform security checks and broad penetration tests.
|Network vulnerability scanning||Vulnerability scanning|
Network security scanning gives us deep insight for quick identification of out-of-compliance or potentially vulnerable systems.
|DDoS mitigation||DDoS mitigation|
Industry-leading infrastructure is in place to protect against and mitigate the impact of denial of service attacks.
Communications between you and Post Affiliate Pro servers are encrypted via industry best-practices HTTPS and Transport Layer Security (TLS) over public networks.
We operate a multi-level backup and disaster recovery strategy. Backups and near real-time snapshots are taken at various intervals and multiple copies are securely stored on different servers. Our disaster recovery program ensures that our services remain available or are easily recoverable in the case of a disaster.
Our redundancy architecture eliminates a single point of failure. Combined with comprehensive backups, we ensure customer data is replicated and available across production systems.
Post Affiliate Pro is fully compliant with the GDPR directive that became enforceable on May 25th, 2018. A team of security experts and developers was working on strengthening our security policies and raising awareness about data protection and what is required of our employees to comply with rules that GDPR puts in place. We also made sure that our customers were informed about the recent development in a timely manner.
Learn more about Post Affiliate Pro and GDPR.
What information do we collect?
We collect email address of Google users.
How do we use the information?
We use it to access mailbox of Google users in order to process their emails into tickets.
How do we share the information?
We don’t share the information with any 3rd parties.
Use of information received from Google APIs will adhere to Google API Services User Data Policy, including the Limited Use requirements.