Putting security first

Putting security first

Putting security first

Putting security first

We know that as a customer, you're entrusting us with sensitive data and we take this responsibility very seriously. Security and privacy are top priorities and we're committed to securing your organization's data, eliminating vulnerabilities, and ensuring continuity of access.

SOC2 Type II

Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.

SOC2 Type II

Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.

SOC2 Type II

Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.

SOC2 Type II

Actively's SOC 2 Type II report covers the trust services categories of Security, Availability, Processing Integrity, Confidentiality, and Privacy, and is audited annually. Please contact us to request a copy of the report.

GDPR

We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.

GDPR

We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.

GDPR

We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.

GDPR

We comply with GDPR data retention requirements, and offer a data processing agreement (DPA) for customers in the EU.

CCPA

We ensure policies, processes, and controls comply with CCPA requirements.

CCPA

We ensure policies, processes, and controls comply with CCPA requirements.

CCPA

We ensure policies, processes, and controls comply with CCPA requirements.

CCPA

We ensure policies, processes, and controls comply with CCPA requirements.

Secure by design

Secure by design

Built to safeguard your organization's data

Built to safeguard your organization's data

Built to safeguard your organization's data

Built to safeguard your organization's data

Secure infrastructure provider

We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.

Secure infrastructure provider

We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.

Secure infrastructure provider

We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.

Secure infrastructure provider

We host all of our data in physically secure Google Cloud facilities that include 24/7 on-site security, camera surveillance, and more. All customer data is hosted in data centers that are SOC 2, ISO 27001 and HITRUST compliant.

Data encryption in transit & at rest

All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQueryFivetranPolytomic, Census.

Data encryption in transit & at rest

All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQueryFivetranPolytomic, Census.

Data encryption in transit & at rest

All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQueryFivetranPolytomic, Census.

Data encryption in transit & at rest

All data sent to or from Actively is encrypted using TLS, and all customer data is encrypted using AES-256 and stored in Google BigQuery. We use secure subprocessors behind-the-scenes (Fivetran, Polytomic, and Census) to connect to your Salesforce and other sales software tools from which we read or write data. Read more about their respective encryption policies: BigQueryFivetranPolytomic, Census.

Data redundancy and resiliency

Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.

Data redundancy and resiliency

Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.

Data redundancy and resiliency

Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.

Data redundancy and resiliency

Actively's infrastructure has been designed to be fault tolerant. All databases operate in a cluster configuration, the user-facing application tier scales to meet demand, and offline pipelines run in containerized virtual machines.

Server security and monitoring

All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.

Server security and monitoring

All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.

Server security and monitoring

All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.

Server security and monitoring

All servers are configured using a documented set of security guidelines and images are managed centrally. Changes to our infrastructure are tracked, and security events are logged appropriately.

Want more info?

Want more info?

Want more info?

Want more info?

Our customers include some of the fastest-growing and largest companies out there (including publicly-traded companies) and we take utmost care to safeguard their data. We're happy to send you more details as needed or answer any questions; just email us at security@actively.ai.


If you're a security researcher, read our vulnerability disclosure policy here.

ACTIVELY AI

Building the future of outbound with AI + automation.

Copyright © 2024 Taurus Labs, Inc. All Rights Reserved

ACTIVELY AI

Building the future of outbound with AI + automation.

Copyright © 2024 Taurus Labs, Inc. All Rights Reserved

ACTIVELY AI

Building the future of outbound with AI + automation.

Copyright © 2024 Taurus Labs, Inc. All Rights Reserved

ACTIVELY AI

Building the future of outbound with AI + automation.

Copyright © 2024 Taurus Labs, Inc. All Rights Reserved