Frequently asked questions
Get answers to our top questions around security, reliability, privacy, and compliance.
Who has access to our data?
Has Adroie defined responsibilities for product security and product operations?
We have published a whitepaper outlining the responsibilities that we manage, and the responsibilities that each of our customers should manage. We've written it with our customers in mind, and we've detailed the particular security topics that each customer should manage.
Will Adroie share information on your internal controls?
We have put a great deal of work into something we call our Adroie Control Framework (ACF), which combines the controls from external regulatory requirements and industry standards. We utilize this framework to implement controls internally and use external companies to evaluate and validate the implementation and operation of our controls.
Is our data encrypted?
How are our passwords stored?
Passwords are cryptographically hashed within Adroie Cloud, which enables user management.
Does Adroie audit its product security?
We have an extensive security program that includes ongoing testing of our our hosted systems and products. We also undertake third party independent assessments of our products.
Can we undertake our own security testing?
I found a vulnerability in one of your products, how do I report it?
If you discovered a vulnerability in one of our products, we appreciate if you let us know so we can get it fixed ASAP. Have a read through our instructions for how to report it or be added to our Hall of Fame.
Can you complete my security questionnaire?
We are committed to being open and transparent and sharing information. Part of this goal is to publish as much information as we can to enable you to be comfortable with your decision to use our products and services. We are not able to answer each individual questionnaire.
What responsibilities does Adroie maintain during a security incident?
Here at Adroie, we try our best to ensure our customers don't experience an outage or a security incident. However, we acknowledge that a security incident has the potential to happen. We have our responsibilities during a security incident and what our customers should plan to manage.