NetfoeBuilt for security-conscious teams
Enterprise-grade security with full transparency
Customer data
Employee Access to Customer Data
Your data stays private. We only access your account when you request support or to investigate a security incident. When we do, we ask for explicit consent and only touch what's necessary to solve your problem.
We have zero direct access to your data by default.
Product security
Permissions
Our product provides role-based access control for authorization, allowing you to control who can access application settings and features.
Password and Credential Storage
Reconmap enforces a password complexity standard and credentials are salted and encrypted using BCrypt.
Uptime
99%+ uptime backed by AWS infrastructure. Track our status and any incidents in real-time at netfoe.instatus.com.
Network and application Security
Data Hosting and Storage
Reconmap hosts its infrastructure and data in Digital Ocean and Amazon Web Services (AWS). We follow DO and AWS’ best practices which allows us to take advantage from their secured, distributed, fault tolerant environment. To find out more information about AWS security practices, see: https://aws.amazon.com/security/.
Failover and Disaster Recovery
We designed for resilience. Your data is mirrored across three AWS data centers—if one goes down, your service never does.
Virtual Private Cloud
All of our servers are within our own virtual private cloud (VPC) with network access controls that prevent unauthorized connections to internal resources.
Back Ups and Monitoring
Reconmap uses automation to backup all datastores that contain customer data. On an application level, we produce audit logs for all activity, forward logs to centralized storage for analysis, and use AWS S3 and AWS Glacier for archival purposes.
Permissions and Authentication
Access to customer data is limited to authorized employees who require it for their job. All access to the Reconmap websites is restricted to HTTPS encrypted connections.
Reconmap enforces policies that requires strong password policies and 2-factor authentication (2FA) on GitHub, Google and AWS to ensure access to cloud services are protected.
Encryption
Every byte of data is encrypted in transit. Passwords and credentials are stored with BCrypt hashing and encryption at rest. What's sensitive stays locked.
Continuous Security Testing
We run automated vulnerability scans regularly and hire third-party penetration testers to find what we miss. Security is ongoing, not a checklist.
Incident Response
Reconmap implements an Incident Response Policy for handling security events which includes escalation procedures, rapid mitigation and post mortem. All employees are informed of our policies.
Additional Security Information
Training
All Reconmap employees complete security awareness training annually.
Policies
Reconmap has developed a comprehensive set of security policies covering a range of topics. These policies are updated frequently and shared with all employees.
Employee Vetting
Reconmap performs background checks on all new employees in accordance with local laws. The background check includes employment verification and criminal checks for US employees.
Confidentiality
All employee contracts include a confidentiality agreement.
PCI Obligations
When you purchase a paid Reconmap subscription, your credit card data is not transmitted through nor stored on our systems. Instead, we depend on Stripe, a company dedicated to this task. Stripe is certified to PCI Service Provider Level 1, the most stringent level of certification available. Stripe's security information is available online.
Security Disclosure
Found a security issue? Report it to security@reconmap.com. We treat this as our highest priority and will work with you responsibly to fix it. We welcome white-hat researchers and won't pursue legal action for good-faith disclosures.