Trust

The word trust is thrown around a lot in security and often is thrown around in cyber-circles with little or no meaning.

When it comes to securing our infrastructure, your data, and our company-at-large we define trust as earning your confidence by providing reliable and repeated secure services and practices over-time with communication and transparency.

Reliability

We operate a globally distributed and highly available set of services in the cloud so you don’t have to. We aim to achieve world-class availability (99.99%)  and performance, have a public status page with our uptime and will provide transparent reports of downtime and public retrospectives on cause / remediation steps to improve.

Security

By using Border0 you are entrusting us to secure all of your connections and your data and we take that responsibility very seriously.

Compliance

Our infrastructure lives inside of AWS’s data centers which meet several compliance standards including;  SOC II, NIST, and PCI certified. We adhere to the shared responsibility model and deploy our own set of security practices and procedures in the areas we run and operate.

Frictionless secure access to your infrastructure so you can build, code, deploy, and manage without security risk and compliance worries.
Frictionless secure access to your infrastructure so you can build, code, deploy, and manage without security risk and compliance worries.

Vulnerability Disclosures

We welcome security disclosures on our product and services. To responsibly report please email .

Privacy

We are 100% committed to NOT selling or providing any information about our customers and will use the data solely for improving the efficacy of our service.

Product Security

We follow modern security practices and policies for code review, build time security, runtime security, and incident response. All builds are scanned for vulnerabilities throughout the process, all code is scanned for miss-configurations, code is backed up, and privileged access is limited (see below).

Company Security

  • Although we have an office in Vancouver we adhere to a BeyondCorp model where we assume all our employees have the same security posture irrespective of location.

  • We eat our own steak, not dog-food. We are our own biggest critic when it comes to secure distributed access to our resources. The Border0 product is used for all employee access to all resources for administration and troubleshooting and critical access is limited to a small group of top-level administrators.

  • All of the infrastructure we operate is in AWS data-centers and complies with several standards when it comes to physical access. We don’t even have access to our own infrastructure :).

  • All employees are required and we enforce Multi-factor authentication for ALL services.

For any other questions on our security please email .

Ready to level up your security?