Data Security Features
We built our application with your security concerns in mind.
Encryption in Transit and at Rest
Data is encrypted in transit, and we use unique per-customer (AES-256-GCM) keys to encrypt data on disk.
Penetration Testing
We participate in independent 3rd-party penetration testing every 6 months.
Audit Logging
Get meaningful visibility into every change in your system.
Intrusion Detection
Tracked anomalies and full command history.
Attribute-based Access Control
Create flexible policies that provide fine-grained access control to everything in Utmost.
Endpoint testing
Customer public endpoints are protected against the most common OWASP Top 10 attack vectors using a web application firewall (WAF).
Cloud-based hosting
Utmost systems are based on immutable and ephemeral infrastructure.