Intelligent Automation Resources
Security Overview
Security Overview
We provide this overview so that you can better understand the security measures that have been designed and built into Put It Forward
Security By Design
Put It Forward was designed from the initial concept with security as a focus. As a result security is a multi-level, multi-method integrated function that is continuous throughout the entire platform. The pipes, the protocols, the content, the physical environment and data are secured.
Secure Partners
Put It Forward has to satisfy and comply with some of the most rigorous security programs in the world in order to satisfy the requirements of global delivery platforms such as Salesforce® , Netsuite® and many government agencies. As a result any system or data source that is available through Put It Forward has the highest level of security to satisfy the requirements of out most rigorous partner.
Data Storage
Data is not stored in Put It Forward by default. Data is persisted as part of queue maintenance until a receiving system is accessible. Put It Forward will persist data within its data base or environment if a client requests or configures it.
We encrypt all data at a very high level across all parts of the platform.
Continuous monitoring and rigorous security checks are part of the service offering at Put It Forward.
Secure Transfers
Any data sent between a source, recipient via Put It Forward is secured at the network level using Secure Socket Layer (SSL) which is the Internet standard.
Your Data is Backed Up
Any configuration, business rules, user profiles or data that is persisted is backed up.
Privacy
A copy of our full privacy policy can be found at: https://www.putitforward.com/privacy
We guard your privacy to the best of our ability and work hard to protect your information from unauthorized access.
Put It Forward employees are prohibited from viewing the content within your integrations and are only permitted to view file meta-data (e.g., integration types and names). Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our privacy policy (e.g., when legally required to do so). But that’s the rare exception, not the rule. We have strict policy and technical access controls that prohibit employee access except in these rare circumstances. In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
Third-party Apps
If you choose to access Put It Forward using third-party applications (“apps”), be aware that those apps utilize their own security protocols and have their own privacy policies. If you’re not comfortable with the privacy and security features of those apps, you shouldn’t use them to access Put It Forward. For example, third-party apps might not employ encryption when transmitting data, might collect information that Put It Forward does not, and might use information differently than Put It Forward does.
Compliance with Laws and Law Enforcement
As set forth in our privacy policy, and in compliance with United States law, Put It Forward cooperates with United States law enforcement when it receives valid legal process, which may require Put It Forward to provide the contents of your private Put It Forward integration. In these cases, Put It Forward will remove Put It Forward’s encryption from the files before providing them to law enforcement.
How to Add Your Own Layer of Encryption to Put It Forward
Put It Forward applies encryption to your files after they have been uploaded, and we manage the encryption keys. Users who wish to manage their own encryption keys can apply encryption before placing their data into Put It Forward. Doing so will also make it impossible for us to recover your data if you lose your encryption key.
I think I've found a security exploit. Where do I report security concerns?
We take a number of measures to ensure that the data you store on Put It Forward is safe and secure. While we're very confident in our technology, we recognize that no system can guarantee data security with 100% certainty. For that reason, we will continue to innovate to make sure that our security measures are state of the art, and we will investigate any and all reported security issues concerning Put It Forward's services or software. For a direct line to our security experts, report security issues toThis email address is being protected from spambots. You need JavaScript enabled to view it. .
We'll fully credit anybody whose reports lead to the improvement of Put It Forward security.
Security By Design
Put It Forward was designed from the initial concept with security as a focus. As a result security is a multi-level, multi-method integrated function that is continuous throughout the entire platform. The pipes, the protocols, the content, the physical environment and data are secured.
Secure Partners
Put It Forward has to satisfy and comply with some of the most rigorous security programs in the world in order to satisfy the requirements of global delivery platforms such as Salesforce® , Netsuite® and many government agencies. As a result any system or data source that is available through Put It Forward has the highest level of security to satisfy the requirements of out most rigorous partner.
Data Storage
Data is not stored in Put It Forward by default. Data is persisted as part of queue maintenance until a receiving system is accessible. Put It Forward will persist data within its data base or environment if a client requests or configures it.
We encrypt all data at a very high level across all parts of the platform.
Continuous monitoring and rigorous security checks are part of the service offering at Put It Forward.
Secure Transfers
Any data sent between a source, recipient via Put It Forward is secured at the network level using Secure Socket Layer (SSL) which is the Internet standard.
Your Data is Backed Up
Any configuration, business rules, user profiles or data that is persisted is backed up.
Privacy
A copy of our full privacy policy can be found at: https://www.putitforward.com/privacy
We guard your privacy to the best of our ability and work hard to protect your information from unauthorized access.
Put It Forward employees are prohibited from viewing the content within your integrations and are only permitted to view file meta-data (e.g., integration types and names). Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our privacy policy (e.g., when legally required to do so). But that’s the rare exception, not the rule. We have strict policy and technical access controls that prohibit employee access except in these rare circumstances. In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
Third-party Apps
If you choose to access Put It Forward using third-party applications (“apps”), be aware that those apps utilize their own security protocols and have their own privacy policies. If you’re not comfortable with the privacy and security features of those apps, you shouldn’t use them to access Put It Forward. For example, third-party apps might not employ encryption when transmitting data, might collect information that Put It Forward does not, and might use information differently than Put It Forward does.
Compliance with Laws and Law Enforcement
As set forth in our privacy policy, and in compliance with United States law, Put It Forward cooperates with United States law enforcement when it receives valid legal process, which may require Put It Forward to provide the contents of your private Put It Forward integration. In these cases, Put It Forward will remove Put It Forward’s encryption from the files before providing them to law enforcement.
How to Add Your Own Layer of Encryption to Put It Forward
Put It Forward applies encryption to your files after they have been uploaded, and we manage the encryption keys. Users who wish to manage their own encryption keys can apply encryption before placing their data into Put It Forward. Doing so will also make it impossible for us to recover your data if you lose your encryption key.
I think I've found a security exploit. Where do I report security concerns?
We take a number of measures to ensure that the data you store on Put It Forward is safe and secure. While we're very confident in our technology, we recognize that no system can guarantee data security with 100% certainty. For that reason, we will continue to innovate to make sure that our security measures are state of the art, and we will investigate any and all reported security issues concerning Put It Forward's services or software. For a direct line to our security experts, report security issues to
We'll fully credit anybody whose reports lead to the improvement of Put It Forward security.
Patterns for Success
Patterns for Success
IDC Analyst Guidance
Report
Integration Choices Checklist
Informed Choices
Buy or Build
Infosheet
Digital Transformation
Digital Transformation
Infosheet
Case Study
6 Questions to Ask
6 Questions To Ask A Potential Partner
Guidebook
Native Integration
The Truth With Native Integration
Can You Afford It?
Whitepaper
Integration Guidebook
Best Practice Guidebook
Roadmap for Success
Report
Solution Templates
Solutions Templates
Best Practice Templates
Blog