Data from client end devices is protected using industry standard security protocols to protect from adversaries
To protect from unauthorized access, data is encrypted while it is stored
To protect data from threats that exploit security bugs, we harden and patch our fleet routinely
Our software development model incorporates security and privacy practices into every stage of its lifecycle
We employ industry-leading anomaly detection programs on our fleet to detect and alert us of any suspicious activity
The human link in the security chain is the strongest at Zendrive; personnel security awareness is a matter we take pride over
Customers can obtain a copy of our recent SOC II Type 2 certification by reaching out on our support channel
Data from client end devices is protected using industry standard security protocols to protect from adversaries