Webinar: Why logical layers matter, and how to use them - Watch On-Demand

Safety & security

Data security for startup to enterprise

Mode is built on a strong foundation of data security and privacy that keeps our platform secure while helping customers of all sizes meet their data protection and compliance requirements.

Secure architecture

Mode’s strong architectural foundation is designed based on fundamental principles of security and privacy.

Technical controls

Mode has implemented a combination of best-in-class security, privacy, and compliance controls that address data protection risks through the entire data lifecycle.

Company culture

Mode has built a company culture that educates and holds every team member accountable to fulfilling their obligations to protect privacy and security of customer data.

Data security and privacy controls

Access management, encryption & endpoint security

Access management

  • Mode adheres to the principles of least privilege and role-based permissions when provisioning access; workers are only authorized to access data that they reasonably must handle in order to fulfill their current job responsibilities.

  • Mode employs multi-factor authentication for access to internal systems. VPN and SSH is required for accessing the production environment.

  • Mode requires personnel to use an approved password manager.

Encryption

  • Mode encrypts data using industry standard protocols

  • Data in transit is encrypted using TLS 1.2 or higher

  • Data at rest is encrypted using AES-256.

  • Key management is in place for encryption keys for production services

Endpoint security

  • All workstations issued to Mode personnel are configured by Mode to comply with our standards for security.

  • These standards require all workstations to be properly configured, updated, and tracked and monitored by Mode’s endpoint management solutions.

  • Mode’s default configuration sets up workstations to encrypt data at rest, have strong passwords, and lock when idle.

  • Workstations run up-to-date monitoring software to report potential malware.

Network security & system monitoring

Penetration testing & vulnerability disclosure

Disaster recovery & incident response

Data privacy

Access management

  • Mode adheres to the principles of least privilege and role-based permissions when provisioning access; workers are only authorized to access data that they reasonably must handle in order to fulfill their current job responsibilities.

  • Mode employs multi-factor authentication for access to internal systems. VPN and SSH is required for accessing the production environment.

  • Mode requires personnel to use an approved password manager.

Encryption

  • Mode encrypts data using industry standard protocols

  • Data in transit is encrypted using TLS 1.2 or higher

  • Data at rest is encrypted using AES-256.

  • Key management is in place for encryption keys for production services

Endpoint security

  • All workstations issued to Mode personnel are configured by Mode to comply with our standards for security.

  • These standards require all workstations to be properly configured, updated, and tracked and monitored by Mode’s endpoint management solutions.

  • Mode’s default configuration sets up workstations to encrypt data at rest, have strong passwords, and lock when idle.

  • Workstations run up-to-date monitoring software to report potential malware.

Go deeper on Mode security

We protect your data by mitigating and preventing risks through industry standard best practices and proactive process improvement. Learn more in our guide.

Get more from your data

Your team can be up and running in 30 minutes or less.

Try for free