The topics of data protection and data security are more relevant than ever. PDF Mail Merger therefore does everything in its power to fully protect you and your documents from the most diverse dangers in the network.
Operational & device security
We develop and deploy infrastructure software using rigorous security practices. Our operations teams detect and respond to threats to the infrastructure from both insiders and external actors, 24/7/365.
Communications over the Internet to PDF Mail Merger are encrypted in transit. Our network and infrastructure have multiple layers of protection to defend us against Denial-of-service attacks.
Identities and services are strongly authenticated with multiple factors. Access to sensitive data is protected by advanced tools like phishing-resistant Security Keys.
Data stored in PDF Mail Merger is automatically encrypted at rest and distributed for availability and reliability. This helps guard against unauthorized access and service interruptions.
Our application is deployed with security in mind. We don’t assume any trust between services, and we use multiple mechanisms to establish and maintain trust. Our infrastructure was designed to be multi-tenant from the start.
From the physical premises to the purpose-built servers, networking equipment, and custom security chips to the low-level software stack running on every machine, our entire hardware infrastructure is controlled, secured, built, and hardened by us.