Secured Platform, Secured Data

We’re constantly improving our security, audit, and compliance solutions with customers in mind. 
The confidentiality, integrity and availability of our customer’s data is paramount to the success of our services and your experience. Our focus is to ensure security throughout each core process. Our security policies protect both your privacy and data while using Image Relay.
image-relay-icon-white-security

Platform

Digital assets and products are the heart and soul of your company. It’s important to keep them safe. Image Relay is SOC 2 certified, guaranteeing your brand secrets are always safe with us.

image-relay-icon-white-integrations

Customers

We recognize that security is a shared responsibility with our customers. We are proud to partner with your security teams to provide the information needed for risk assessments of our security and compliance posture.

image-relay-icon-white-templates

Products

 We embody the shift toward investments in safe and secure software design practices. We embed security expertise and capabilities into every phase of our Software Development Lifecycle. 

Infrastructure & Software

  • We regularly update our servers, tools, libraries, and patch vulnerabilities as they are discovered. Our application, host, and network are automatically scanned. We also automatically detect out-of-date dependencies.

  • Secrets are stored securely and never in source code. Access to our infrastructure and related services requires SSH and two-factor authentication when possible.

  • All data is encrypted at rest using AES-256 standard and while in transit using TLS 1.3. Large data backups are encrypted using the AES algorithm immediately upon creation.

  • Our infrastructure runs on fault-tolerant systems and backups are made daily. We leverage redundant third-party providers to provide 24/7 monitoring and alerting of any downtime.

  • Our system is hosted on Amazon Cloud Services, a leading cloud provider that holds rigorous industry security certifications. 

Trust & Verification

  • Team administrators can manage team-wide security settings, including single sign-on and two-factor authentication, integrations, and user management. Tracking reports may be run on a per-file or per-user basis to see who is downloading which files and how they are being used.

  • User access is password-protected to a highly granular level. Customizable permission groups determine which folder, file, or function a user may view, download, or perform. Administrators can quickly modify or remove the access of an entire group of users.

  • We conduct annual penetration tests on our application and infrastructure. These audits are conducted by respected independent security firms. Any issues surfaced are tracked and prioritized to their resolution.

  • We welcome responsible security research and disclosure on our product and infrastructure. Potential vulnerabilities can be reported on our Vulnerability Page.

Experience The Power of Marketing Delivery!

Marketing Delivery is purpose-built to streamline workflow and assure brand consistency from a secure, all-in-one platform. Explore PIM and DAM system plans or schedule a demo to see it for yourself.