Enterprise Grade Security & Compliance


How Logstail.com secures Customer Data

From handling security incidents to develop best practices for security auditing and compliance with the most strict industry data, we are committed to ensure you that we appreciate your decision to trust us with your or your customers’ data. We try by every available mean and following the 5 Trust Critical Principals – Security, Availability, Processing, Confidentiality and Privacy to address the risks and opportunities of IT-enabled systems and protect your business data. If there are any questions or concerns, please contact us at support@logstail.com

Data Centers Security

Logstail.com infrastructure has been deployed on IBM Cloud, one of the most trusted and proven Enterprise Clouds. IBM Cloud Security’s scalable suite of technologies and solutions are made more robust and complete through pervasive encryption, AI + automation and integration and offers its partners not  a full stack of IBM Cloud security services, but also the IBM security team supporting more than 12,000 customers in 133 countries. IBM Cloud complies with the most strict Industry Security Standards, for example
  • ISO 27001
  • ISO 27017
  • ISO 27018 
  • ISO 22301
  • ISO 31000
  • SOC 1, SOC 2 and SOC 3
  • GDPR
  • PCI
  • HITRUST
  • IRAP (Australia)
  • IBM ISO Management System Certification
  • EU Model Clauses
  • FERPA
  • HIPAA 
  • ITAR
All data centers that host Logstail platform are 24/7 secured and monitored. (For more information about IBM’s secure cloud and compliance certifications, visit: https://www.ibm.com/cloud/compliance)

Operational security

Logstail staff takes further steps in order to secure its infrastructure from unauthorized use.
  • Uses logging and tracking software to monitor Access to Systems and perform auditing tests.
  • Applies system patches on an hourly basis.
  • Uses firewalls and other protective and monitoring solutions to secure its systems.
  • Secured and scalable Docker containers host all services. We follow the best practices available today at the Industry to build, maintain and secure all our containers.  Software patches and updates are being applied upon their release.

File Transfer and User Access Security

Every access to the Logstail.com or the rest of the infrastructure is restricted and forced to HTTPS only encrypted connections. We support role-based access through our user interface, separating access as admins or users. When sensitive customer data (like passwords etc) are discovered at logs, customers are informed and effective solutions are proposed, like sensitive data filtering etc. All customer data are being securely stored and proceeded on our production cloud servers and remain live until deleted by the user through his personal Dashboard or by request to support@logstail.com or at the end of the retention period.  We do not store any other copy of your data unless you have requested it.

Logstail.com Staff Data Access

Only selected support team members will have access to your data following your support request, unless there is security incident, where our security team investigates it. Not every time that data access is required, due to above reasons, we will ask you for your permission, since it will be impractical. When support has been requested, we try really hard to access the minimum required customer data, respecting your privacy.

Financial Info Security (Credit Card)

When you pay for a Logstail.com subscription plan, your credit card data is not transmitted through nor stored on our systems. Instead, everything is proceeded through Braintree, one of the most known payment companies that is also certified as PCI Service Provider Level 1, the most stringent level of certification available. For more information, please visit https://www.braintreepayments.com/en-fr/features/data-security