By using comprehensive controls against security vulnerabilities we respond to incidents quickly and with insights into attacks and we find threats through analysis. The overall security of Floodgate App is determined by a combination of Floodgates proprietary software, the hosting environment, and the procedures and processes of the applications administrators and users.
We have procedures in place to ensure vulnerability and penetration testing happens regularly, every 30 – 60 days. By following trusted publications and using comprehensive scans we update definitions as they come. We understand how valuable your supporter data is, so we encrypt everything. As we said, security and your privacy is our top priority.
Who actually owns your data? You do. No meta data, usage or personal information is available to anyone but you.
The overall security of Floodgate App is determined by a combination of Floodgates proprietary...Read More
Everyday, thousands of users trust Floodgate to capture, validate and keep their data secure..Read More
You have sole ownership of your data, always. It’s that simple. Floodgate makes it simple to manage...Read More