Putting security first
Putting security first
Putting security first
Putting security first
We know that as a customer, you're entrusting us with sensitive data and we take this responsibility very seriously. Security and privacy are top priorities and we're committed to securing your organization's data, eliminating vulnerabilities, and ensuring continuity of access.
SOC2 Type II
Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.
SOC2 Type II
Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.
SOC2 Type II
Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.
SOC2 Type II
Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.
GDPR
We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.
GDPR
We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.
GDPR
We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.
GDPR
We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.
CCPA
We ensure policies, processes, and controls comply with CCPA requirements.
CCPA
We ensure policies, processes, and controls comply with CCPA requirements.
CCPA
We ensure policies, processes, and controls comply with CCPA requirements.
CCPA
We ensure policies, processes, and controls comply with CCPA requirements.
Secure by design
Secure by design
Built to safeguard your organization's data
Built to safeguard your organization's data
Built to safeguard your organization's data
Built to safeguard your organization's data
Secure infrastructure provider
We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.
Secure infrastructure provider
We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.
Secure infrastructure provider
We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.
Secure infrastructure provider
We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.
Data encryption in transit & at rest
All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQuery, Fivetran, Polytomic, Census.
Data encryption in transit & at rest
All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQuery, Fivetran, Polytomic, Census.
Data encryption in transit & at rest
All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQuery, Fivetran, Polytomic, Census.
Data encryption in transit & at rest
All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQuery, Fivetran, Polytomic, Census.
Data redundancy and resiliency
Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.
Data redundancy and resiliency
Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.
Data redundancy and resiliency
Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.
Data redundancy and resiliency
Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.
Server security and monitoring
All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.
Server security and monitoring
All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.
Server security and monitoring
All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.
Server security and monitoring
All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.
Want more info?
Want more info?
Want more info?
Want more info?
Our customers include some of the fastest-growing and largest companies out there (including publicly-traded companies) and we take utmost care to safeguard their data. We're happy to send you more details as needed or answer any questions; just email us at security@actively.ai.
If you're a security researcher, read our vulnerability disclosure policy here.
ACTIVELY AI
Building the future of outbound with AI + automation.
Copyright © 2024 Taurus Labs, Inc. All Rights Reserved
ACTIVELY AI
Building the future of outbound with AI + automation.
Copyright © 2024 Taurus Labs, Inc. All Rights Reserved
ACTIVELY AI
Building the future of outbound with AI + automation.
Copyright © 2024 Taurus Labs, Inc. All Rights Reserved
ACTIVELY AI
Building the future of outbound with AI + automation.
Copyright © 2024 Taurus Labs, Inc. All Rights Reserved