Data Security and Governance

Protect customer privacy and ensure compliance with a multitiered security approach that safeguards data, applications, systems, and infrastructure.

Total Data Security All the Time

RESUL applies AES 256-bit encryption and SHA-256 tokenization to all data and campaign content deemed sensitive by you—whether at rest, in motion, or on display—to maintain confidentiality and render critical information unidentifiable to both users and outsiders.

  • Sensitive data stored on-premises or in a private cloud for brands with greater regulatory pressure.
  • Adoption of both industry-specific encryption and RESUL-defined custom logic where all keys are not with one person or entity.
  • Audience data stored in a dedicated database for each tenant.
  • Data transfers with 256-bit TLS encryption and via secure web service.
  • Site-to-site VPN connection when transferring sensitive data for brands subject to increased regulatory pressure.
  • Controlled attributes not sent to the cloud.
  • Masking and obfuscation of sensitive data on display to prevent exposure and theft.
  • Role-based security control enabling over hierarchical roles and restrictions across levels.
top-curve
Stringent Application Security at Every Level

As a multi-tenanted cloud solution, RESUL provides a segregated database, along with dedicated services and scripts, for every client to ensure account security. Manage platform access with assurance by combining multi-factor authentication, LDAP-/ADFS-/Azure-friendly role-based authorization, and restricted IP access.

top-curve
Sophisticated system security Icon
Sophisticated System Security across Environments

RESUL shields the modules, resources, and configurations powering your account through detailed, system-wide activity logging. With geo-fencing for the zoning of data and tested disaster recovery plans in place, Resulticks takes care of security from the physical layer up.

top-curve
Fortified Infrastructure from Every Angle

RESUL utilizes Tier IV/Tia 942 data centers that are biometric-protected, SOC 1 and SOC 2 certified, and SSAE 16/ISAE 3402 attested—with 100% power back facility.

Additional infrastructure protections are provided through powerful anti-spam and anti-virus controls, network-based intrusion detection mechanisms, restricted IP access for administration and server notifications, advanced firewalls, and much more.

top-curve
Certifications & Compliance
Ready to Take Security and Compliance to the Next Level?

Request a meeting
Blog Key Elements of Risk Governance practice for Optimum Data Security Learn more
Infographics The RESUL Cloud - A Security Perspective Learn more