Zoho's Security Practices

Customers often ask us: "How do I know my data is safe with Zoho?'

Keeping our customers' data safe & secure is obviously very important for all of us at Zoho. Not only because well, it's YOUR data and you have trusted us with it, but also because our business depends on customers trusting us.

We protect our customers' data in four different ways: Physical Security, Network Security, People Processes and through Redundancy and Continuity. That means that we keep your data safe with essential precautions like bullet-resistant walls and 24x7x365 guards and monitoring, but also with some of the most advanced network security and people processes. And of course, is not only the data that is backed-up/replicated across different machines, but we also have back-ups for power, cooling, our internet connection to you and more.

Along the same lines, we often throw a slightly different question for customers to ask themselves..."how do YOU know your data is safe with YOU?" And that gets them thinking. We can safely say that Zoho offers better data security protection than what most firms can technically provide or can afford by themselves.

The following Zoho Show presentation summarizes our approach to protecting your data. For more details, please refer to the Zoho Security Practices, Policies & Infrastructure document.

Rodrigo

Comments

20 Replies to Zoho's Security Practices

  1. I would have to agree with Jim....I can't believe that after all this time and years that no one else has commented on the fact that all data is protected only by a moderately secure password entry. Anyone else want to comment on this?

  2. I would have to agree with Jim....I can't believe that after all this time and years that no one else has commented on the fact that all data is protected only by a moderately secure password entry. Anyone else want to comment on this?

  3. Any chance we can host the physical database on our own servers and have the process gateway (creation of the database) through you or access through you?I'd be happier and more quick to go Paid version if I could have the physical database on my end.

  4. Any chance we can host the physical database on our own servers and have the process gateway (creation of the database) through you or access through you?I'd be happier and more quick to go Paid version if I could have the physical database on my end.

  5. ZOHO should really provide verification or real and documented evidence that ZOHO is ABSOLUTELY secure to those 1.5 million companies that are using ZOHO. For all I know, they're all risking their information for a cheaper and more accessible component. Although I use ZOHO I NEVER Store any personal information that may be misused or abused deliberately by others.

  6. ZOHO should really provide verification or real and documented evidence that ZOHO is ABSOLUTELY secure to those 1.5 million companies that are using ZOHO. For all I know, they're all risking their information for a cheaper and more accessible component. Although I use ZOHO I NEVER Store any personal information that may be misused or abused deliberately by others.

  7. @Jim :1. You can protect your account access through the configured list of IP Addess(es) and/or IP Range(s).Go to,
    https://accounts.zoho.com " rel="nofollow">https://accounts.zoho.com >> "Allowed IPs" and Configure the required settings.2 .Another feature, to force the services access always through secure connectionPreferences >> Always use secure (https) access.more to come .. post your feedbacks and requirements

  8. @Jim :1. You can protect your account access through the configured list of IP Addess(es) and/or IP Range(s).Go to,
    https://accounts.zoho.com " rel="nofollow">https://accounts.zoho.com >> "Allowed IPs" and Configure the required settings.2 .Another feature, to force the services access always through secure connectionPreferences >> Always use secure (https) access.more to come .. post your feedbacks and requirements

  9. I would feel better seeing names like Verisign and reports by recognized third parties. Anyone can make all sorts of claims. Where's the proof?

  10. I would feel better seeing names like Verisign and reports by recognized third parties. Anyone can make all sorts of claims. Where's the proof?

  11. Where is the strong auth for users?You say you are secure, yet you offer NOTHING more than a password to protect your users data...

  12. Where is the strong auth for users?You say you are secure, yet you offer NOTHING more than a password to protect your users data...

Leave a Reply

Your email address will not be published.

The comment language code.
By submitting this form, you agree to the processing of personal data according to our Privacy Policy.

Related Posts