Hootsuite utilizes both cloud and physical servers in our infrastructure. Our cloud is provisioned by a well known top tier provider. Our physical servers are located in Tier-4 datacenters with full power, cooling, and network redundancy.
We value your data and work hard to protect it. We store it on multiple hosts in multiple locations and back it up regularly, as often as four times per day per datastore. Data stored on our physical servers is protected by biometric locks, multiple layers of access security, and 24x7 interior and exterior surveillance.
Only our Engineering team has access to our production environment. SSH keys or Kerberos tokens are required for console access to our servers, in all of our environments. We have automated processes in place that monitor each host for unauthorized login attempts, and offending IP addresses are automatically blacklisted and alerted.
Hootsuite Media Inc. uses third party vendors and hosting partners to provide the necessary hardware, software, networking, storage, and related technology required to run Hootsuite. Although Hootsuite Media Inc. owns the code, databases, and all rights to the Hootsuite application, you retain all rights to your data.
To report an incident of suspected abuse, misuse, or a security issue you have discovered please see our Security Response page. For incidents that affect a single account please contact Hootsuite Help.
We respect the effort and skill that goes into finding and disclosing security flaws. We are grateful for the generosity and support of the following individuals and organizations: