网页在线咨询
在线商务咨询
添加企业微信
4008-753-365

This is How SUBMAIL protects your privacy and
data security.

Data security is the foundation of cloud communication platform. Privacy data of enterprises
and individuals must be strictly protected.
   Download pdf           中文

The privacy data leak situation is grim

n recent years, the situation of privacy disclosure has become more and more important, which
has brought many security risks to individuals. For enterprises, once they fail to do a good job of
information protection, it will not only cause economic losses, but also damage the trust of
clients and corporate image, resulting in negative social impact. Some may even face legal
proceedings and criminal investigations. As a cloud communication platform for enterprises and
users, SUBAMIL must do its best to protect clients information and data.
Personal Privacy
Communication Data
Operating Data
Trade Secret
Business Interaction
User Portrait

SUBMAIL Data encryption and security

Strictly check and protect user privacy

ISO 27001 Information Security Management System Certification

  SUBMAIL has been certified
ISO 27001 is a widely used and typical information security management standard in the world. The certification shows that it has complied with relevant laws and regulations, established a proper information and data protection system, ensured the management standards of cloud computing services, and can protect the information system security, intellectual property rights, business secrets of enterprises and related parties.

Network Protection Layer Encryption

Sources of threat:
In the process of network transmission, information and data may be stolen and hijacked. Even web pages can be tampered with directly and replaced by fake phishing websites.
Solution:
SUBMAIL adopts advanced HTTPS and Sl/TLS secure encryption transmission protocol (including website, API, and Intranet transmission), layer by layer encryption, to ensure the security and stability of users.

System protection

Sources of threat:
System loophole, API interface loopholes, the lack of a complete account management system and other issues may give hackers an opportunity.
Solution:
SUBMAIL prevents user data leakage through access protection, key management, patch upgrade, loophole protection, multi-account management and other multi-dimensional solutions, and truly achieves security, stability.

Real-time monitoring

Sources of threat:
If the data management in cloud communication is not transparent and detailed, there will be the risk of data leakage, which will also cause users'doubts.
Solution:
SUBMAIL supports users to view account logs and export logs of data in the account at any time, and accurately to IP, time, browser and operating system.

Data Storage

Sources of threat:
Data processing and storage are often neglected. Once problems such as loss, leakage and insufficient backup occur, will often lead irreversible consequences.
Solution:
In SUBMAIL, all your information and data will be kept for 90 days. From 90 days to 180 days, it will enter the gray area and be ready for removal. After 180 days, all your privacy data will be permanently deleted and only the analysis report will be reserved.

SUBMAIL Future Data Security Planning

Hierarchical system of authority
Reduce the complexity of authorization management, optimize the experience and improve the protection capability. Layers of checkpoints are linked to improve the multi-account management system.
Information Security Management
Continuously optimize and improve the accuracy and real-time of the log, monitor the dynamic data in detail, and form a more systematic, clear and transparent security management system.
Data Protection System
Continue to expand the scope of data protection, timely identify and solve data security risks in process control, improve risk analysis and early warning system.
请致电 SUBMAIL :4008-753-365 立即免费注册