PLATFORM SECURITY

Secure platform architecture with robust protection

Our team creates the most secure platform architecture to keep your data safe.

Control in cloud

Proshort is hosted on the Google Cloud Platform, which has a proven track record for physical security and internal controls.

Control in cloud

Proshort is hosted on the Google Cloud Platform, which has a proven track record for physical security and internal controls.

Control in cloud

Proshort is hosted on the Google Cloud Platform, which has a proven track record for physical security and internal controls.

Always up to date

Proshort requires no on-premises hardware or software to maintain and patch, (use of a client-side video recording assistant is optional). It is always up to date with the latest security patches.

Always up to date

Proshort requires no on-premises hardware or software to maintain and patch, (use of a client-side video recording assistant is optional). It is always up to date with the latest security patches.

Always up to date

Proshort requires no on-premises hardware or software to maintain and patch, (use of a client-side video recording assistant is optional). It is always up to date with the latest security patches.

Encryption at rest

We use the Google managed encryption keys with 256-bit AES also called symmetric keys. These data keys are changed regularly and stored in a keystore using additional encryption.

Encryption at rest

We use the Google managed encryption keys with 256-bit AES also called symmetric keys. These data keys are changed regularly and stored in a keystore using additional encryption.

Encryption at rest

We use the Google managed encryption keys with 256-bit AES also called symmetric keys. These data keys are changed regularly and stored in a keystore using additional encryption.

Encryption in transit

Google's robust infrastructure is used for all network activity. It encrypts and authenticates all data in transit at one or more network layers when data moves outside physical boundaries not controlled by Google. Within the boundaries of google environment, the requests are always authenticated.

Encryption in transit

Google's robust infrastructure is used for all network activity. It encrypts and authenticates all data in transit at one or more network layers when data moves outside physical boundaries not controlled by Google. Within the boundaries of google environment, the requests are always authenticated.

Encryption in transit

Google's robust infrastructure is used for all network activity. It encrypts and authenticates all data in transit at one or more network layers when data moves outside physical boundaries not controlled by Google. Within the boundaries of google environment, the requests are always authenticated.