Safety & security
Data security for startup to enterprise
Mode is built on a strong foundation of data security and privacy that keeps our platform secure while helping customers of all sizes meet their data protection and compliance requirements.
Secure architecture
Mode’s strong architectural foundation is designed based on fundamental principles of security and privacy.
Technical controls
Mode has implemented a combination of best-in-class security, privacy, and compliance controls that address data protection risks through the entire data lifecycle.
Company culture
Mode has built a company culture that educates and holds every team member accountable to fulfilling their obligations to protect privacy and security of customer data.
Data security and privacy controls
Access management, encryption & endpoint security
Access management
Mode adheres to the principles of least privilege and role-based permissions when provisioning access; workers are only authorized to access data that they reasonably must handle in order to fulfill their current job responsibilities.
Mode employs multi-factor authentication for access to internal systems. VPN and SSH is required for accessing the production environment.
Mode requires personnel to use an approved password manager.
Encryption
Mode encrypts data using industry standard protocols
Data in transit is encrypted using TLS 1.2 or higher
Data at rest is encrypted using AES-256.
Key management is in place for encryption keys for production services
Endpoint security
All workstations issued to Mode personnel are configured by Mode to comply with our standards for security.
These standards require all workstations to be properly configured, updated, and tracked and monitored by Mode’s endpoint management solutions.
Mode’s default configuration sets up workstations to encrypt data at rest, have strong passwords, and lock when idle.
Workstations run up-to-date monitoring software to report potential malware.
Network security & system monitoring
Penetration testing & vulnerability disclosure
Disaster recovery & incident response
Data privacy
Access management
Mode adheres to the principles of least privilege and role-based permissions when provisioning access; workers are only authorized to access data that they reasonably must handle in order to fulfill their current job responsibilities.
Mode employs multi-factor authentication for access to internal systems. VPN and SSH is required for accessing the production environment.
Mode requires personnel to use an approved password manager.
Encryption
Mode encrypts data using industry standard protocols
Data in transit is encrypted using TLS 1.2 or higher
Data at rest is encrypted using AES-256.
Key management is in place for encryption keys for production services
Endpoint security
All workstations issued to Mode personnel are configured by Mode to comply with our standards for security.
These standards require all workstations to be properly configured, updated, and tracked and monitored by Mode’s endpoint management solutions.
Mode’s default configuration sets up workstations to encrypt data at rest, have strong passwords, and lock when idle.
Workstations run up-to-date monitoring software to report potential malware.
Go deeper on Mode security
We protect your data by mitigating and preventing risks through industry standard best practices and proactive process improvement. Learn more in our guide.