Security at Zudello
Protecting your data
We’re committed to the security of our customers’ data and provide multiple layers of protection for the personal and financial information you trust to Zudello.
You control access
We provide standard access to the Zudello software through a login and password. In addition we offer the option of using two-step authentication. This provides a second level of security for your Zudello account. It means you’re also asked to enter a unique code generated by a separate authenticator app on your smartphone. We recommend you use two-step authentication as it reduces the risk of your Zudello account being accessed if your password is compromised.
We encrypt all data that goes between you and Zudello using industry-standard TLS (Transport Layer Security), protecting your personal and financial data. Your data is also encrypted at rest when it is stored on our servers, and encrypted when we transfer it between data centres for backup and replication.
Zudello takes a “defence in depth” approach to protecting our systems and your data. Multiple layers of security controls protect access to and within our environment, including firewalls, intrusion protection systems and network segregation. Zudello’s security services are configured, monitored and maintained according to industry best practice. We partner with industry-leading security vendors to leverage their expertise and global threat intelligence to protect our systems.
Secure data centres
Zudello servers are located within enterprise-grade hosting facilities that employ robust physical security controls to prevent physical access to the servers they house. These controls include 24/7/365 monitoring and surveillance, on-site security staff and regular ongoing security audits. Zudello maintains multiple geographically separated data replicas and hosting environments to minimise the risk of data loss or outages.
Zudello’s Security team continuously monitors security systems, event logs, notifications and alerts from all systems to identify and manage threats.
Zudello has produced a Service Organization Control (SOC 2) report. The report is the result of an independent auditor's examination of Zudello's cloud based accounting system relevant to the Trust Services Principles and Criteria for Security, Availability, and Confidentiality.
If you have questions, or would like to request the latest available SOC 2 report, please complete this request form and a Zudello Customer Experience representative will contact you.
Best in class availability
With a record of 99.97% uptime, Zudello delivers best-in-class availability. We use multiple redundancy technologies for our hardware, networks, data centres and infrastructure. These ensure that if any component fails, Zudello will keep on running – with little or no disruption to your service.
Built to perform at scale
Zudello has been designed to grow with your business. Our high performance servers, networks and infrastructure ensure we can deliver quality service to you and our hundreds of thousands of other users.
Disaster recovery and readiness
Zudello performs real-time data replication between our geographically diverse, protected facilities, to ensure your data is available and safely stored. This means that should even an unlikely event occur, such as an entire hosting facility failure, we can switch over quickly to a backup site to keep Zudello and your business running. We transmit data securely, across encrypted links.
Constant updates and innovation
We’re constantly enhancing Zudello, delivering new features and performance improvements. Updates are delivered frequently, with the majority of them being delivered without interrupting our service and disrupting users.