! -- Canonnical -->
Your and your communities’ security is our top priority.
These are our guiding principles on our mission to transform our clients’ communities around the world and ultimately provide solutions that are flexible, scalable, and efficient.
Operations before features
Be bold, code safe
Focus on growing and engaging your community while we take care of the security.
Glue Up solutions are constantly evolving and improving. We release new features, updates and bug fixes every week so you can have better experience with our software everytime you log in.
All servers that run Glue Up software in production are recent, continuously patched Linux systems following the latest industry standards. Depending on domain your account is on, your data is stored following specific regulations in a given country (i.e. GDPR or China Cybersecurity Law).
Glue Up stores document data such as metadata, activity, original files, and customer’s data in different locations while also compiling and generating documents when requested. All data in each location is encrypted at rest with AES-256 and sophisticated encryption keys management.
Glue Up integrates with many payment gateways, all of which are compliant with PCI DSS and does not process, store, or transmit any payment card data.
The production application and underlying infrastructure components are monitored 24/7/365 days a year, by dedicated monitoring systems. Critical alerts generated by these systems are sent to 24/7/365 on-call DevOps team members and escalated appropriately to operations management.
Glue Up infrastructure utilizes many layered techniques for increasingly reliable uptime (<99.9%). Including the use of auto-scaling, load balancing, task queues, and rolling deployments. We do full daily automated backups of our databases. All backups are encrypted.
Web application security is evaluated by the development team in sync with the application release cycle. This vulnerability testing includes the use of commonly known web application security toolkits and scanners to identify application vulnerabilities before they are released into production.
A Best-In-Class Solution