Security is built into the fabric of our service, infrastructure, and processes, so you can rest assured that your data is safeguarded.
Cloud Product Security
Security is built into the fabric of our cloud products. We employ numerous controls to safeguard your data including encryption in transit and at rest across our cloud services. While a young company, and currently short on certifications, we take security seriously and are in the process of setting up both SOC 2 and ISO27001.
Security Operations and Best Practices
We approach security holistically with a common controls framework. Security threats are prevented using secure software development practices, and industry-accepted operational practices.
Platform and network security
We perform rigorous security testing including threat-modeling, automated scanning, and third-party testing. If an incident occurs, we resolve the issue quickly using our security incident response practices and keep you informed with real-time system status.
Availability and Continuity
We maintain high levels of availability with multiple geographically diverse data centers and robust Disaster Recovery and Business Continuity programs.
Key Security Offerings
Here's a look at some of our most significant and highly-requested security features.
checkData encryption in Transit
checkData encryption at Rest
checkEnforced two-factor authentication (2FA)
checkAdherence to industry cloud security standards
Fast track your vendor security assessment
Transparency is key to our security philosophy. That's why we partner with the Cloud Security Alliance (CSA) to make our Consensus Assessment initiative Questionnaire (CAIQ) publicly available.
Chinafy encourages customers and the security research community to report vulnerabilities in our product to us. While we do not currently have a bug bounty program in place, we ask that you reach out to us at firstname.lastname@example.org.