Security overview
We strive to keep your trust, as reflected in our security measures.
Last updated
We strive to keep your trust, as reflected in our security measures.
Last updated
eztalks protects not just the messages that you are sending, but also the messages that you might have sent at any time in the past. The data encryption protocols of eztalks are the same as those used by the top-end IT companies in the world.
Every file that you attach with eztalks is encrypted with 256-bit Advanced Encryption Standard (AES). Even the messages in transit are encrypted, so no one other than the intended party can intercept your private communication.
eztalks aims to deliver you premium performance, without compromising even slightly on the security of the system. This is why we have an n-tier architecture design for our system which boasts numerous protection layers for your data safety.
eztalks employs a team of quality analysts who check the application and every update constantly, searching for any bugs or security fixes. We allow no chance of any glitches or bugs with the application when it is ready and presented to you.
eztalks uses a key management system that’s only to be seen in the cutting-edge hi-tech IT security industries in the world. The keys that are used to encrypt the data have very limited access to the members of eztalks team cannot view your private messages.
Two-factor authentication creates an additional wall of security to keep your private data safe from any cyber-attacks. With Two-factor authentication, no one other than you can access your private account.
Web Application Firewalls (also known by their acronym, WAFs) are the natural protection of our system against any SQL injection attacks, cross-site forgery, and cross-site scripting.
DDoS attacks might be common nowadays, but they do not stand a chance with eztalks. eztalks CDN network capacity is 20 times larger than the biggest DDoS attack that has been created so far. Therefore, it is assumed that eztalks will continue to protect the system in the future as well.
The security protocols are not just limited to the application software, they apply to the hardware as well. eztalks stores all the private data in Amazon AWS data centers. AWS is the largest Cloud computing company in the world. Each data center conforms to the highest security protocols present, such as ISO 27001 and the Cloud Security Alliance (CSA).
HIPAA deals with keeping healthcare and patient data completely safe and secure. eztalks adheres to the strictest HIPAA compliance and follows every safeguard protocol listed by the HIPAA.
Every person’s Protected Health Information (PHI) and electronic Protected Health Information (ePHI) are provided with the security and privacy that it deserves.
Payment Card Industry- Data Security Standards (PCI- DSS) detail the security measures that are necessary to keep financial transactions safe and secure.
eztalks uses two payment gateways and both adhere to PCI- DSS. The first one is Stripe which processes payments made through credit cards, and the second one is PayPal. Any private credit card information or PayPal credentials will not be stored by eztalks.
eztalks professional members get advanced controls over how they want their data to be protected as well as their privacy settings. Some of these advanced security controls include:
If any user no longer works in your organization, you can delete this user account from eztalks system easily.
There is an option to enable or disable the two-factor authentication on your eztalks account for every platform individually.
Team administrators can make use of access logs to know which members of the team have accessed the system and when they accessed it. The access logs are detailed with the user ID, login time, as well as the IP address of the connection.
If any enterprise users need a Business Associate Agreement to comply with Health Insurance Portability and Accountability Act, eztalks signs that as well.
At eztalks, we strive to provide the best security and privacy measures to each and every user. In this regard, we welcome any suggestions or reports from security researchers who have found a vulnerability in the system.
Our security team takes each legitimate report seriously and investigates it thoroughly. Therefore, if you feel that you have encountered a system vulnerability, you can report it to us right away.
If you want to report a bug in the system, you can mail us at: