Card image cap
8 min

System Security

Floodgate clients all over the world trust our software to keep their valuable supporter information perfectly secure. Your datas security is our top priority.

When it comes to your data’s security, we practice what’s called active defence.

By using comprehensive controls against security vulnerabilities we respond to incidents quickly and with insights into attacks and we find threats through analysis. The overall security of Floodgate App is determined by a combination of Floodgates proprietary software, the hosting environment, and the procedures and processes of the applications administrators and users.

Vulnerability and Penetration Tests with Active Monitoring

We have procedures in place to ensure vulnerability and penetration testing happens regularly, every 30 – 60 days. By following trusted publications and using comprehensive scans we update definitions as they come. We understand how valuable your supporter data is, so we encrypt everything. As we said, security and your privacy is our top priority.




Data is always encrypted even for our developers and staff.

Who actually owns your data? You do. No meta data, usage or personal information is available to anyone but you.

Matt Taylor, Floodgate App
Share Story   
SIMILAR ARTICLES

You Might Like to Read These Articles

Card image cap
System Security

The overall security of Floodgate App is determined by a combination of Floodgates proprietary...

Read More
Card image cap
PCI Compliance

Everyday, thousands of users trust Floodgate to capture, validate and keep their data secure..

Read More
Card image cap
Data Protection

You have sole ownership of your data, always. It’s that simple. Floodgate makes it simple to manage...

Read More