ISO 9001
Your data security matters to us
When you join Creatopy, you can rest assured that your data is in safe hands. By running compliance checks, a range of security-specific features, and an enhanced level of protection, we are committed to maintaining customer trust at the core of our organization.
ISO 9001
ISO 27001
ISO 20000 - 1
Security specific features
SSO for secure access
We have implemented the single sign-on authentication (SSO) to diminish data breaches and password-related incidents. Enjoy an enhanced level of security, quick sign-ins, and no more 'Forgot your password' prompts.
Safe collaboration
Share your work through a simple share link without worrying about creating new accounts. Make your feedback and share links public or private, depending on who you collaborate with.
Granular permissions
You have full control over the access levels. Assign different roles and rights to your team, depending on how much visibility and permissions you want to grant to each one, whether admin, editor, or viewer.
How we deal with personal data protection
Creatopy is committed to treating employee and customer personal data following the main privacy laws and regulations, such as the GDPR and the CCPA.
What else we do to secure your data
Password storage and hosting
We use the bcrypt algorithm to securely store Creatopy credentials. We host our services and data in Amazon Web Services (AWS) facilities in the United States (us-east-1 region).
Failover and disaster recovery
As our infrastructure and data are spread across three AWS availability zones, you can rest assured that there is always a connection backup if one of the data centers fails.
Virtual private cloud
Our servers are located within our own secure and isolated virtual private cloud (VPC) protected by network access control lists (ACLs).
Multi-factor authentication
To ensure safe access to cloud services, we have implemented 2-factor authentication (2FA) and strong password practices on Google, AWS, and other tools we use daily.
Data encryption
Our data is encrypted in transit with 256-bit encryption. Our platform endpoints are TLS/SSL only, with an A+ rating on Qualys SSL Labs' tests. We only use strong cipher suites and fully enable HSTS and Perfect Forward
Secrecy features.
Incident response
We handle security events using an internal protocol that includes escalation procedures, rapid mitigation, and post-mortem. All employees are aware of the policies.
Do you want to learn more about our
security systems?
If you have any questions about the practices we use to protect customer data, please get in
touch with us.