Security Statement


World-Class Security Infrastructure

Processmaker.com provides state-of-the-art security to ensure that your customer data is never compromised. At processmaker.com, we know that security is crucial to you - that's why security is our top priority. We devote significant resources to continually develop our world-class security infrastructure. The result: unsurpassed security and privacy for our customer's information. With processmaker.com, you enjoy protection and peace of mind that only our world-class security infrastructure can provide. Among other security measures, processmaker.com provides:

  • Experienced, professional engineers and security specialists dedicated to data and systems protection

  • Continuous deployment of proven, up-to-date security technologies, including proprietary products developed for processmaker.com

  • Ongoing evaluation of emerging security developments and threats

  • Redundancy throughout the entire processmaker.com online infrastructure


Security Details

Processmaker.com is configured by experts and rigorously tested before going into production. Our hosting facilities adhere to world-class security policies including proven, up-to-date firewall protection, intrusion detection systems, SSL encryption, and other security technologies.

Unless otherwise specified in your particular product or service contract, our service offerings utilize the AWS cloud, one of the leading cloud and facilities providers in the world.

Amazon Web Services Cloud Compliance enables customers to understand the robust controls in place at AWS to maintain security and data protection in the cloud. As systems are built on top of AWS cloud infrastructure, compliance responsibilities will be shared. By tying together governance-focused, audit-friendly service features with applicable compliance or audit standards, AWS compliance enablers build on traditional programs; helping customers to establish and operate in an AWS security control environment.

Data Encryption

Processmaker.com uses the strongest encryption products to protect customer data and communications, including 128/256-bit COMMODO SSL Certification and AWS RDS encryption.  

User Authentication

Users access Processmaker only with a valid username and password combination, which is encrypted via SSL while in transmission. Users are prevented from choosing weak or obvious passwords. An encrypted session ID cookie is used to uniquely identify each user. For added security, the session key is automatically scrambled and re-established in the background at regular intervals.

Application Security

Our robust application security model prevents one processmaker.com customer from accessing another's data. This security model is reapplied with every request and enforced for the entire duration of a user session.  ProcessMaker uses various security tools to verify security best practices throughout the software development lifecycle (SDLC).

Internal Systems Security

Inside of the perimeter firewalls, the systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more. The specific details of these features are proprietary.

Operating System Security

Processmaker.com enforces tight operating system-level security by using a minimal number of access points to all production servers. We protect all operating system accounts with strong passwords, and production servers do not share a master password database. All operating systems are maintained at each vendor's recommended patch levels for security and are hardened by disabling and/or removing any unnecessary users, protocols, and processes.

Database Security

Whenever possible, database access is controlled at the operating system and database connection level for additional security. Access to production databases is restricted to a limited number of points, and production databases do not share a master password database.


Server Management Security

All data entered into the Processmaker application by a customer is owned by that customer. Processmaker.com employees do not have direct access to the Processmaker.com production equipment, except where necessary for system management, maintenance, monitoring, and backups.

Reliability and Backup

All networking components, SSL accelerators, load balancers, Web servers, and application servers are configured in a redundant configuration. All customer data is stored on a database served by a database server cluster for redundancy. All customer data is stored on carrier-class disk storage using RAID disks and multiple data paths. All customer data, up to the last committed transaction, is automatically backed up to a primary tape library on a nightly basis. Backup tapes are immediately cloned to verify their integrity, and the clones are moved to secure, fire-resistant, off-site storage on a regular basis.

Disaster Recovery

Processmaker.com has a agreements in place with third-party cloud facility providers of availability services to provide access to geographically remote disaster recovery facilities if necessary - along with required hardware, software, and Internet connectivity - in the event our production facilities were to be rendered unavailable.

Processmaker.com has disaster recovery plans in place and tests them regularly - in our QA environment on a quarterly basis and off-site with the third-party provider on an annual basis.

Use of the processmaker.com service is subject to the terms and conditions of the customer's subscription agreement with ProcessMaker Inc. Processmaker.com may modify its security infrastructure and/or this security datasheet from time to time.