Skip to content
On this page

Security

At Exploodo we really care for the safety of your data. Our goal is to provide a maximum of security with a minimal impact on performance and user experience.

Exploodo is hosted in Microsoft Azure - a scalable Cloud-Computing platform using end-to-end security and state-of-the-art integrated data protection and security features. Security is also prioritized during the whole development process.

You will find details regarding security in Microsoft Azure at https://www.microsoft.com/en-us/trust-center/product-overview. For security reasons we will not publish any details about features, services and data center zones we use. Nevertheless, below we provide you with a short overview of security measures we have implemented to protect your data.

Data Center Security

Microsoft is permanently improving the scalability and security of the Azure Cloud platform services by implementing security measures and conducting independent assessments. The Azure infrastructure is hosted in data centers distributed all over the world; the exact position of the data centers is not even known to Microsoft employees - except to those who need the information for their day-to-day work.

Infrastructure Security

The Exploodo infrastructure is hosted in a completely redundant and secured environment. Access to this infrastructure is restricted to an absolute minimum, database servers are isolated from the internet, backups never leave the data center.

Additionally the whole web application is protected by Cloudflare, a world-leading Internet Security Provider. For details about Cloudflare check out https://www.cloudflare.com/security.

Application Security

Communication from and to Exploodo is always encrypted. The messages cannot be intercepted by a third party or an attacker.

Our application development process follows the "Security by Design" principle. By systematically integrating security measures in each phase of software development, potential security leaks can be identified and eliminated at a very early stage.

Security audits and penetration tests are carried out by external partners and consultants on a regular basis.