World-Class Security Infrastructure provides state-of-the-art security to ensure that your customer data is never compromised. At, we know that security is crucial to you - that's why security is our top priority. We devote significant resources to continually develop our world-class security infrastructure. The result: unsurpassed security and privacy for our customer's information. With, you enjoy protection and peace of mind that only our world-class security infrastructure can provide. Among other security measures, provides:

  • Experienced, professional engineers and security specialists dedicated to data and systems protection
  • Continuous deployment of proven, up-to-date security technologies, including proprietary products developed for
  • Ongoing evaluation of emerging security developments and threats
  • Redundancy throughout the entire online infrastructure

Security Details is configured by experts and rigorously tested before going into production. Our hosting facilities adhere to world-class security policies including proven, up-to-date firewall protection, intrusion detection systems, SSL encryption, and other security technologies.

Unless otherwise specified in your particular product or service contract, our service offerings utilize the AWS cloud, one of the leading cloud and facilities providers in the world.

Amazon Web Services Cloud Compliance enables customers to understand the robust controls in place at AWS to maintain security and data protection in the cloud. As systems are built on top of AWS cloud infrastructure, compliance responsibilities will be shared. By tying together governance-focused, audit-friendly service features with applicable compliance or audit standards, AWS compliance enablers build on traditional programs; helping customers to establish and operate in an AWS security control environment.

Data Encryption uses the strongest encryption products to protect customer data and communications, including 128/256-bit COMMODO SSL Certification and AWS RDS encryption.

User Authentication

Users access Processmaker only with a valid username and password combination, which is encrypted via SSL while in transmission. Users are prevented from choosing weak or obvious passwords. An encrypted session ID cookie is used to uniquely identify each user. For added security, the session key is automatically scrambled and re-established in the background at regular intervals.

Application Security

Our robust application security model prevents one customer from accessing another's data. This security model is reapplied with every request and enforced for the entire duration of a user session. ProcessMaker uses various security tools to verify security best practices throughout the software development lifecycle (SDLC).

Internal Systems Security

Inside of the perimeter firewalls, the systems are safeguarded by network address translation, port redirection, IP masquerading, non-routable IP addressing schemes, and more. The specific details of these features are proprietary.

Operating System Security enforces tight operating system-level security by using a minimal number of access points to all production servers. We protect all operating system accounts with strong passwords, and production servers do not share a master password database. All operating systems are maintained at each vendor's recommended patch levels for security and are hardened by disabling and/or removing any unnecessary users, protocols, and processes.

Database Security

Whenever possible, database access is controlled at the operating system and database connection level for additional security. Access to production databases is restricted to a limited number of points, and production databases do not share a master password database.

Server Management Security

All data entered into the Processmaker application by a customer is owned by that customer. employees do not have direct access to the production equipment, except where necessary for system management, maintenance, monitoring, and backups.

Reliability and Backup

All networking components, SSL accelerators, load balancers, Web servers, and application servers are configured in a redundant configuration. All customer data is stored on a database served by a database server cluster for redundancy. All customer data is stored on carrier-class disk storage using RAID disks and multiple data paths. All customer data, up to the last committed transaction, is automatically backed up to a primary tape library on a nightly basis. Backup tapes are immediately cloned to verify their integrity, and the clones are moved to secure, fire-resistant, off-site storage on a regular basis.

Disaster Recovery has a agreements in place with third-party cloud facility providers of availability services to provide access to geographically remote disaster recovery facilities if necessary - along with required hardware, software, and Internet connectivity - in the event our production facilities were to be rendered unavailable. has disaster recovery plans in place and tests them regularly - in our QA environment on a quarterly basis and off-site with the third-party provider on an annual basis.

Use of the service is subject to the terms and conditions of the customer's subscription agreement with ProcessMaker Inc. may modify its security infrastructure and/or this security datasheet from time to time.