Keeping your

data safe.

Keeping your

data safe.

Ensuring the utmost security for your data is a top priority at Reel. We approach data integrity with the same level of commitment as we do for our own information.

Infrastructure

Your data, secured.

Your data, secured.

Data Encryption

Data is encrypted with TLS 1.2+ in transit and AES-256 at rest, encryption keys being managed by Google Cloud Platform.

Data Encryption

Data is encrypted with TLS 1.2+ in transit and AES-256 at rest, encryption keys being managed by Google Cloud Platform.

EU Cloud Hosting

Reel is hosted in Europe using Google Cloud Platform services, offering the best guarantee in terms of physical and infrastructure security.

EU Cloud Hosting

Reel is hosted in Europe using Google Cloud Platform services, offering the best guarantee in terms of physical and infrastructure security.

Data Segregation

Robust measures are implemented to prevent data leakage. Development, QA, and production environments are securely isolated to maintain data integrity.

Data Segregation

Robust measures are implemented to prevent data leakage. Development, QA, and production environments are securely isolated to maintain data integrity.

Secure Authentication

Passwords are salted and hashed using the bcrypt algorithm, we also allow users to log in through Google’s Identity.

Secure Authentication

Passwords are salted and hashed using the bcrypt algorithm, we also allow users to log in through Google’s Identity.

Trusted by leading companies

Security &

Compliance

Controls

Security &

Compliance

Controls

Infrastructure security

Unique production database authentication enforced

Unique account authentication enforced

Production database access restricted

+8 more

Infrastructure security

Unique production database authentication enforced

Unique account authentication enforced

Production database access restricted

+8 more

Organizational security

Anti-malware technology utilized

Password policy enforced

MDM system utilized

+5 more

Organizational security

Anti-malware technology utilized

Password policy enforced

MDM system utilized

+5 more

Product security

Data encryption utilized

Control self-assessments conducted

Data transmission encrypted

Product security

Data encryption utilized

Control self-assessments conducted

Data transmission encrypted

Questions?

Answers.

Questions?

Answers.

Still have questions? Our security team is here to help.
Get in touch with them today.

Still have questions? Our security team is here to help. Get in touch with them today.

How does Reel ensure data anonymity ?

Data points extracted from your files are added to aggregated metrics (averages, standard deviation, etc), which are then shared with our other customers. So no one can directly access or identify your data.

How do you protect my data ?

How do you secure internal access to my data ?

Can I connect to the platform through SSO ?

Do you plan on passing security certifications ?

How does Reel ensure data anonymity ?

Data points extracted from your files are added to aggregated metrics (averages, standard deviation, etc), which are then shared with our other customers. So no one can directly access or identify your data.

How do you protect my data ?

How do you secure internal access to my data ?

Can I connect to the platform through SSO ?

Do you plan on passing security certifications ?

Start buying at
the right price.

The Negotiation Intelligence Platform helping leading companies optimize spending with live market data.

© 2024 Reel. All rights reserved

Terms

Privacy

Designed by

Flexboom

The Negotiation Intelligence Platform helping leading companies optimize spending with live market data.

© 2024 Reel. All rights reserved

Terms

Privacy

Designed by

Flexboom

Start buying at the right price.

Start buying at the right price.