Overview
Rootly has implemented best-in-class security practices to keep customer data safe and operates in the most regulated markets.
100+ global organizations from startups to F500 trust Rootly to be their incident management solution of choice.
Contact: security@rootly.com
Compliance
CCPA
GDPR
SOC 2
Documents
Network Diagram
Pentest Report
SOC 2 Report
Vulnerability Assessment Report
SOC 2
Cyber Insurance
Data Processing Agreement
Master Services Agreement
Business Continuity Policy
Product Security
Role-Based Access Control
Audit Logging
Data Security
See more
Reports
Network Diagram
Pentest Report
SOC 2 Report
See more
Data Security
Access Monitoring
Backups Enabled
Data Erasure
See more
App Security
Responsible Disclosure
Code Analysis
Software Development Lifecycle
See more
Legal
Cyber Insurance
Data Processing Agreement
Master Services Agreement
See more
Access Control
Data Access
Logging
Password Security
Infrastructure
Anti-DDoS
Amazon Web Services
BC/DR
See more
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Mobile Device Management
Network Security
Data Loss Prevention
Security Information and Event Management
Zero Trust
Corporate Security
Email Protection
Employee Training
Incident Response
See more
Policies
Business Continuity Policy
Trust Center Updates
After careful review of our infrastructure and SBOM, the Rootly team has determined that we are not currently vulnerable to the OpenSSL 3 vulnerabilities CVE-2022-3602 and CVE-2022-3786 that were disclosed on November 1, 2022.
Published at N/A
If you think you may have discovered a vulnerability, please send us a note.