Security Statement

World-Class Security Infrastructure

Processmaker.com provides state-of-the-art security to ensure that your customer data is never compromised. At processmaker.com, we know that security is crucial to you - that's why security is our top priority. We devote significant resources to continually develop our world-class security infrastructure. The result: unsurpassed security and privacy for our customer's information. With processmaker.com, you enjoy protection and peace of mind that only our world-class security infrastructure can provide. Among other security measures, processmaker.com provides:

  • Experienced, professional engineers and security specialists dedicated to data and systems protection
  • Continuous deployment of proven, up-to-date security technologies, including proprietary products developed for processmaker.com
  • Ongoing evaluation of emerging security developments and threats
  • Redundancy throughout the entire processmaker.com online infrastructure


Security Details

Processmaker.com is configured by experts and rigorously tested before going into production. Our hosting facilities adhere to world-class security policies including proven, up-to-date firewall protection, intrusion detection systems, SSL encryption, and other security technologies.

To meet your expectations, our network is housed in a world class data center, operated by Quality Technology Services, Inc., one of the leading data center providers in the world. Quality Technology Services (QTS) provides eApps with the data center infrastructure and high volume, redundant Internet connections required to support commercial grade web sites and applications.

Physical Security

Our primary facility is the Atlanta data center of QTS. This 376,000 square foot facility is one of the top data centers in the USA. It is located in a geographic formation that minimizes the possibility of wind and tornado damage. Temperature is regulated within a very low tolerance. The data center has redundant UPS power systems for essential power backup, with sufficient generators to ensure unlimited critical backup power.

The data center is served by multiple high speed optical connections from various backbone providers. Our primary feed is through Internap, one of the most highly rated backbone providers. Internap's ability to intelligently route traffic for maximum throughput is unsurpassed. Internap also has superior abilities to detect and quickly respond to threats and traffic issues. Our investment in this upstream provider is well justified.

Perimeter Defense

The network perimeter is protected by multiple firewalls and monitored by intrusion detection systems - all sourced from industry-leading security vendors. In addition, Processmaker.com monitors and analyzes firewall logs to proactively identify security threats. 

Data Encryption

Processmaker.com uses the strongest encryption products to protect customer data and communications, including 128/256-bit COMMODO SSL Certification. The lock icon in the browser indicates that data is fully shielded from access while in transit.

User Authentication

Users access Processmaker only with a valid username and password combination, which is encrypted via SSL while in transmission. Users are prevented from choosing weak or obvious passwords. An encrypted session ID cookie is used to uniquely identify each user. For added security, the session key is automatically scrambled and re-established in the background at regular intervals. 

Application Security

Our robust application security model prevents one processmaker.com customer from accessing another's data. This security model is reapplied with every request and enforced for the entire duration of a user session.

Internal Systems Security

Inside of the perimeter firewalls, the systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more. The specific details of these features are proprietary.

Operating System Security

Processmaker.com enforces tight operating system-level security by using a minimal number of access points to all production servers. We protect all operating system accounts with strong passwords, and production servers do not share a master password database. All operating systems are maintained at each vendor's recommended patch levels for security and are hardened by disabling and/or removing any unnecessary users, protocols, and processes.

Database Security

Whenever possible, database access is controlled at the operating system and database connection level for additional security. Access to production databases is restricted to a limited number of points, and production databases do not share a master password database. 

Server Management Security

All data entered into the Processmaker application by a customer is owned by that customer. Processmaker.com employees do not have direct access to the Processmaker.com production equipment, except where necessary for system management, maintenance, monitoring, and backups. 

Reliability and Backup

All networking components, SSL accelerators, load balancers, Web servers, and application servers are configured in a redundant configuration. All customer data is stored on a database served by a database server cluster for redundancy. All customer data is stored on carrier-class disk storage using RAID disks and multiple data paths. All customer data, up to the last committed transaction, is automatically backed up to a primary tape library on a nightly basis. Backup tapes are immediately cloned to verify their integrity, and the clones are moved to secure, fire-resistant, off-site storage on a regular basis. 

Disaster Recovery

Processmaker.com has a agreements in place with third-party cloud facility providers of availability services to provide access to geographically remote disaster recovery facilities if necessary - along with required hardware, software, and Internet connectivity - in the event our production facilities were to be rendered unavailable.

Processmaker.com has disaster recovery plans in place and tests them regularly - in our QA environment on a quarterly basis and off-site with the third-party provider on an annual basis. 

Use of the processmaker.com service is subject to the terms and conditions of the customer's subscription agreement with ProcessMaker Inc. Processmaker.com may modify its security infrastructure and/or this security datasheet from time to time.