Welcome to Portal

?Unknown\pull-down

Welcome to Zoho Cares

Bienvenido a Soporte de Zoho

Search our knowledge base, ask the community or submit a request.

Encryption Process at Zoho Campaigns

Encryption is primarily used to safeguard the content of a message so that only the intended recipient can read it. This is done by replacing the content with unrecognizable data, which could be understood only by the intended recipient. This is how encryption became a method to protect data from those who might want to steal it.
 
Encryption can be used in two situations.
  1. Encryption in Transit.
  2. Encryption at Rest (EAR).

 Encryption in Transit

This refers to the data that is encrypted when it is in transit including from your browser to the web server and other third parties via integrations. Encrypting data in transit protects your data from man-in-the-middle-attacks. Click here to learn more.

 Encryption at Rest

This refers to the data that is encrypted when it is stored (not moving) either on a disc, in a database, or some other form of media. Compared to encryption of data during transit, encryption of data when it is stored in the servers provides a higher level of security. EAR protects against any possible data leak due to server compromise or unauthorized access.
Encryption is done at the application layer using the AES-256 algorithm which is a symmetric encryption algorithm and uses 128-bit blocks and 256-bit keys. The key used to convert the data from plain text to cipher text is called Data Encryption Key(DEK). The DEK is further encrypted using the KEK (Key Encryption Key), thus, providing yet another layer of security. The keys are generated and maintained by our in-house Key Management Service(KMS). Click here to learn more.

What data do we encrypt in Zoho Campaigns?

We encrypt the users uploading contact list files in Zoho Campaigns at rest. Additionally, you can encrypt custom fields that add an extra layer of security for data like credit card numbers, personally identifiable information that your company might define as requiring additional protection. Click here to learn more about encryption of the custom fields.

Full-disk Encryption

Besides application layer encryption, full disk encryption is available in India (IN), Australia (AU) and Japan (JP) data centers. Click here to learn more.

Encryption At Zoho

Refer to this white paper to learn more about how data is encrypted at Zoho.

Helpful?20
Updated: 1 year ago
Share :