Reservr
Home Pricing Features Get Started
Home Security

Security

Last updated: January 1, 2024

Your data security is our top priority. Learn about our comprehensive security measures, compliance certifications, and data protection practices.

Table of Contents

  • 1. Security Overview
  • 2. Compliance & Certifications
  • 3. Data Encryption
  • 4. Access Controls
  • 5. Network Security
  • 6. Infrastructure Security
  • 7. Security Monitoring
  • 8. Incident Response
  • 9. Data Protection
  • 10. Third-Party Security
  • 11. Security Contact

1. Security Overview

At Reservr, security is not just a feature—it's a fundamental principle that guides everything we do. We implement industry-leading security measures to protect your data and ensure the confidentiality, integrity, and availability of our services.

1.1 Security Principles

  • Defense in Depth: Multiple layers of security controls
  • Zero Trust Architecture: Never trust, always verify
  • Least Privilege Access: Minimal necessary permissions
  • Continuous Monitoring: 24/7 security surveillance
  • Regular Auditing: Ongoing security assessments

1.2 Security Governance

Our security program is overseen by our Chief Security Officer (CSO) and includes regular board-level reporting, comprehensive risk assessments, and continuous improvement initiatives.

2. Compliance & Certifications

We maintain multiple security certifications and comply with industry standards:

2.1 SOC 2 Type II

SOC 2 Type II Certified

Annual third-party audit of our security controls covering security, availability, processing integrity, confidentiality, and privacy.

2.2 GDPR Compliance

GDPR Compliant

Full compliance with EU General Data Protection Regulation, including data subject rights and privacy by design.

2.3 ISO 27001

ISO 27001 Certified

International standard for information security management systems (in progress).

2.4 Other Standards

  • PCI DSS Level 1 (Payment Card Industry Data Security Standard)
  • HIPAA Ready (Health Insurance Portability and Accountability Act)
  • CCPA Compliant (California Consumer Privacy Act)
  • PIPEDA Compliant (Personal Information Protection and Electronic Documents Act)

3. Data Encryption

We use industry-standard encryption to protect your data at rest and in transit:

3.1 Encryption at Rest

  • AES-256: All data stored using Advanced Encryption Standard with 256-bit keys
  • Database Encryption: Full database encryption with transparent data encryption (TDE)
  • File System Encryption: All file systems encrypted at the block level
  • Backup Encryption: All backups encrypted with separate encryption keys

3.2 Encryption in Transit

  • TLS 1.3: All communications protected with Transport Layer Security 1.3
  • Perfect Forward Secrecy: Unique session keys for each connection
  • Certificate Pinning: Additional protection against certificate attacks
  • HSTS: HTTP Strict Transport Security headers enforced

3.3 Key Management

  • Hardware Security Modules (HSMs) for key storage
  • Automated key rotation and lifecycle management
  • Separate encryption keys for different data types
  • Secure key escrow and recovery procedures

4. Access Controls

We implement comprehensive access controls to ensure only authorized personnel can access your data:

4.1 Authentication

  • Multi-Factor Authentication (MFA): Required for all administrative access
  • Single Sign-On (SSO): Enterprise-grade identity management
  • Password Policies: Strong password requirements and regular rotation
  • Biometric Authentication: Available for mobile applications

4.2 Authorization

  • Role-Based Access Control (RBAC): Granular permissions based on job functions
  • Principle of Least Privilege: Minimal necessary access rights
  • Just-in-Time Access: Temporary elevated permissions when needed
  • Regular Access Reviews: Quarterly review of all access rights

4.3 Administrative Controls

  • Background checks for all employees with data access
  • Confidentiality agreements and security training
  • Regular security awareness training and phishing simulations
  • Incident reporting and whistleblower protection

5. Network Security

Our network infrastructure is designed with security as a primary consideration:

5.1 Network Architecture

  • Segmented Networks: Isolated network segments for different functions
  • Firewalls: Next-generation firewalls with deep packet inspection
  • Intrusion Detection/Prevention: Real-time monitoring and threat blocking
  • DDoS Protection: Distributed denial-of-service attack mitigation

5.2 Network Monitoring

  • 24/7 network traffic monitoring and analysis
  • Anomaly detection using machine learning
  • Real-time threat intelligence integration
  • Automated incident response and blocking

5.3 VPN and Remote Access

  • Secure VPN access for remote employees
  • Zero-trust network access (ZTNA) for external users
  • Device compliance checking before access
  • Session recording and monitoring

6. Infrastructure Security

Our cloud infrastructure is built on industry-leading platforms with enterprise-grade security:

6.1 Cloud Security

  • AWS/Azure/GCP: Multi-cloud architecture for redundancy
  • Container Security: Secure containerization with runtime protection
  • Serverless Security: Secure serverless function execution
  • Cloud Security Posture Management: Continuous compliance monitoring

6.2 Physical Security

  • Data centers with 24/7 physical security
  • Biometric access controls and video surveillance
  • Environmental controls and fire suppression
  • Redundant power and cooling systems

6.3 System Hardening

  • Regular security patches and updates
  • System hardening following industry best practices
  • Vulnerability scanning and penetration testing
  • Configuration management and drift detection

7. Security Monitoring

We maintain comprehensive security monitoring and logging across all systems:

7.1 Security Information and Event Management (SIEM)

  • Centralized logging and event correlation
  • Real-time threat detection and alerting
  • Behavioral analytics and anomaly detection
  • Automated response to security incidents

7.2 Log Management

  • Comprehensive logging of all system activities
  • Immutable log storage and integrity verification
  • Long-term log retention for compliance
  • Log analysis and forensic capabilities

7.3 Threat Intelligence

  • Integration with commercial threat intelligence feeds
  • Internal threat hunting and analysis
  • Indicators of Compromise (IoC) monitoring
  • Threat actor profiling and attribution

8. Incident Response

We have a comprehensive incident response program to quickly detect, contain, and recover from security incidents:

8.1 Incident Response Team

  • Dedicated Security Operations Center (SOC)
  • 24/7 incident response capabilities
  • External security partners and consultants
  • Legal and communications support

8.2 Response Procedures

  • Detection: Automated monitoring and manual reporting
  • Analysis: Rapid assessment and classification
  • Containment: Immediate threat isolation and mitigation
  • Eradication: Complete threat removal and system cleaning
  • Recovery: System restoration and validation
  • Lessons Learned: Post-incident review and improvement

8.3 Communication

  • Internal notification procedures
  • Customer communication protocols
  • Regulatory reporting requirements
  • Public relations and media management

9. Data Protection

We implement multiple layers of data protection to ensure your information remains secure:

9.1 Data Classification

  • Public: Information that can be freely shared
  • Internal: Information for internal use only
  • Confidential: Sensitive business information
  • Restricted: Highly sensitive personal data

9.2 Data Loss Prevention (DLP)

  • Content inspection and classification
  • Data exfiltration prevention
  • Endpoint DLP for mobile devices
  • Cloud DLP for SaaS applications

9.3 Backup and Recovery

  • Automated daily backups with encryption
  • Geographically distributed backup storage
  • Regular backup testing and validation
  • Point-in-time recovery capabilities

10. Third-Party Security

We carefully vet and monitor all third-party vendors and service providers:

10.1 Vendor Assessment

  • Security questionnaires and assessments
  • On-site security audits when necessary
  • Reference checks and reputation analysis
  • Contractual security requirements

10.2 Ongoing Monitoring

  • Regular security reviews and assessments
  • Performance monitoring and SLA tracking
  • Incident notification and response coordination
  • Contract renewal security evaluations

10.3 Key Vendors

  • Cloud Providers: AWS, Azure, Google Cloud Platform
  • Security Tools: CrowdStrike, Splunk, Okta
  • Payment Processing: Stripe, PayPal (PCI DSS compliant)
  • Communication: Twilio, SendGrid (encrypted communications)

11. Security Contact

For security-related questions, concerns, or to report a security incident:

Security Team: security@reservr.com
Chief Security Officer: cso@reservr.com
Security Hotline: +61 (0) 7 3000 0002
General Security: security@reservr.com

11.1 Security Reporting

If you discover a security vulnerability, please report it responsibly to our security team. We appreciate your help in keeping our platform secure.

11.2 Security Updates

We regularly publish security updates and advisories. Subscribe to our security mailing list to stay informed about important security information.

Terms and Conditions Privacy Policy Cookie Policy GDPR Compliance Security Contact Us

© 2025 Reservr Inc. All rights reserved.

We Use Cookies

We use cookies to enhance your experience, analyze site traffic, and personalize content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy.

Cookie Preferences

We use different types of cookies to optimize your experience on our platform. You can choose which categories you'd like to allow. You can change these settings at any time.

Essential Cookies

These cookies are necessary for the website to function and cannot be switched off.

These cookies enable basic functions like page navigation, access to secure areas, and authentication. The website cannot function properly without these cookies.

Examples: Authentication cookies, security cookies, load balancing cookies

Analytics Cookies

These cookies help us understand how visitors interact with our website.

These cookies collect information about how visitors use our website, such as which pages are visited most often and if they get error messages from web pages.

Examples: Google Analytics, Hotjar, Mixpanel

Functional Cookies

These cookies enable enhanced functionality and personalization.

These cookies allow the website to remember choices you make and provide enhanced, more personal features.

Examples: Language preferences, theme settings, dashboard layouts

Marketing Cookies

These cookies are used to deliver relevant advertisements and track campaign effectiveness.

These cookies are used to track visitors across websites to display relevant and engaging advertisements.

Examples: Google Ads, Facebook Pixel, retargeting cookies
Privacy Policy Cookie Policy