Keeping your
data safe.
Keeping your
data safe.
Ensuring the utmost security for your data is a top priority at Reel. We approach data integrity with the same level of commitment as we do for our own information.
Infrastructure
Infrastructure
Your data, secured.
Your data, secured.
Data Encryption
Data is encrypted with TLS 1.2+ in transit and AES-256 at rest, encryption keys being managed by Google Cloud Platform.
Data Encryption
Data is encrypted with TLS 1.2+ in transit and AES-256 at rest, encryption keys being managed by Google Cloud Platform.
EU Cloud Hosting
Reel is hosted in Europe using Google Cloud Platform services, offering the best guarantee in terms of physical and infrastructure security.
EU Cloud Hosting
Reel is hosted in Europe using Google Cloud Platform services, offering the best guarantee in terms of physical and infrastructure security.
Data Segregation
Robust measures are implemented to prevent data leakage. Development, QA, and production environments are securely isolated to maintain data integrity.
Data Segregation
Robust measures are implemented to prevent data leakage. Development, QA, and production environments are securely isolated to maintain data integrity.
Secure Authentication
Passwords are salted and hashed using the bcrypt algorithm, we also allow users to log in through Google’s Identity.
Secure Authentication
Passwords are salted and hashed using the bcrypt algorithm, we also allow users to log in through Google’s Identity.
Trusted by leading companies
Infrastructure security
Unique production database authentication enforced
Unique account authentication enforced
Production database access restricted
+8 more
Infrastructure security
Unique production database authentication enforced
Unique account authentication enforced
Production database access restricted
+8 more
Organizational security
Anti-malware technology utilized
Password policy enforced
MDM system utilized
+5 more
Organizational security
Anti-malware technology utilized
Password policy enforced
MDM system utilized
+5 more
Product security
Data encryption utilized
Control self-assessments conducted
Data transmission encrypted
Product security
Data encryption utilized
Control self-assessments conducted
Data transmission encrypted
Internal security procedures
Whistleblower policy established
Management roles and responsibilities defined
Vulnerabilities scanned and remediated
Internal security procedures
Whistleblower policy established
Management roles and responsibilities defined
Vulnerabilities scanned and remediated
Data and privacy
Data retention procedures established
Customer data deleted upon leaving
Data classification policy established
Data and privacy
Data retention procedures established
Customer data deleted upon leaving
Data classification policy established
Questions?
Answers.
Questions?
Answers.
Still have questions? Our security team is here to help.
Get in touch with them today.
Still have questions? Our security team is here to help. Get in touch with them today.
How does Reel ensure data anonymity ?
Data points extracted from your files are added to aggregated metrics (averages, standard deviation, etc), which are then shared with our other customers. So no one can directly access or identify your data.
How do you protect my data ?
How do you secure internal access to my data ?
Can I connect to the platform through SSO ?
Do you plan on passing security certifications ?
How does Reel ensure data anonymity ?
Data points extracted from your files are added to aggregated metrics (averages, standard deviation, etc), which are then shared with our other customers. So no one can directly access or identify your data.
How do you protect my data ?
How do you secure internal access to my data ?
Can I connect to the platform through SSO ?
Do you plan on passing security certifications ?