I have sensitive documents. How safe is PDF Mail Merger?

Search the Knowledgebase


I have sensitive documents. How safe is PDF Mail Merger?

Avatar photo
febrero 29, 2024

The topics of data protection and data security are more relevant than ever. PDF Mail Merger therefore does everything in its power to fully protect you and your documents from the most diverse dangers in the network.

Operational & device security

We develop and deploy infrastructure software using rigorous security practices. Our operations teams detect and respond to threats to the infrastructure from both insiders and external actors, 24/7/365.

Internet communication

Communications over the Internet to PDF Mail Merger are encrypted in transit. Our network and infrastructure have multiple layers of protection to defend us against Denial-of-service attacks.


Identities and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.

Storage services

Data stored in PDF Mail Merger is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.

Service deployment

Our application is deployed with security in mind. We don’t assume any trust between services, and we use multiple mechanisms to establish and maintain trust. Our infrastructure was designed to be multi-tenant from the start.

Hardware infrastructure

From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is controlled, secured, built, and hardened by us.

Did you find this article helpful?
9 out of 13 found this helpful
Still have questions? Send us an Email or Message us

Related Stories