This page covers essential aspects of Zoho Creator, delving into its security features, official certifications, audit reports, and authentication mechanisms, providing comprehensive insights into data safety for your business workflows.
Note: A dedicated folder focusing on Privacy and Security-related questions will be available in the near future.
How secure is Creator?
Zoho Creator hosted in our own
secure cloud, which has multiple layers of security. Additionally, the compliance levels of each data center can be easily accessed
here.
Zoho Creator takes security seriously and is compliant with numerous data protection laws from around the world, including the most stringent ones like EU's GDPR.
Healthcare providers, educational institutions, financial services, governmental organizations, and some of the largest corporations in the world are some of our esteemed clients, and they entrust us with their data.
Please take a moment to view our privacy policyHere is a whitepaper about security in ZohoWhat security features does Zoho Creator offer to protect my data?
The security measures implemented throughout your application's lifecycle are as follows:
- Ensure your data is secure at all times:
With the aid of features like encryption, data retention, and more, keep the integrity of all your data while keeping it properly accessible. - Complete software protection:
Utilize features like API security and session management to guarantee that data sharing within your application always complies with regulations. - Administrate who has access to your app:
With features like IP restrictions, password policies, and others, you can prevent unauthorized access to your application.
How safe is my data with Zoho Creator?
Zoho Creator places the utmost importance on the safety of your data. App security, which involves safeguarding your applications against security vulnerabilities throughout the app development lifecycle using software, hardware, and protocols, is a top priority.
With Zoho Creator, you can build secure apps thanks to its robust OWASP-based security framework. This framework ensures that your application adheres to coding guidelines and thoroughly screens code changes for potential threats using vulnerability scanners and manual review processes.
Zoho Creator follows a security-by-design approach, actively mitigating threats like cross-site scripting and application layer attacks. Through these measures, the platform works diligently to protect your applications and maintain a secure environment for your data.
How is my data separated logically?
Our framework distributes and manages cloud space for our customers. The framework uses a collection of secure protocols to logically segregate each customer's service data from the data of other customers.
Have you obtained any official security certifications (ISMS certification, Privacy Mark, etc.) or audit reports?
Yes. Zoho Creator complies with a range of international privacy and security standards, with certifications including ISO 27001, ISO 27701, ISO 27017, ISO 27018, ISO 9001, SOC 2, ENS. You can find more details about additional compliances in our compliance portfolio. We are compliant with some of the strictest laws and regulatory standards worldwide such as GDPR, HIPAA, CCPA. Additionally, we regularly acquire formal certifications and audit reports from independent third-party assessors.
Take a look at all our compliance certifications here:
https://www.zoho.com/compliance.htmlIs it possible to use other authentication methods in addition to password authentication?
You can configure multi-factor authentication using
Zoho One-Auth.
It supports different modes like biometric Touch ID or Face ID, Push Notification, QR code, and Time-based OTP.
We also support
Yubikey Hardware Security Key for multi-factor authentication.
Is my data encrypted at rest?
Yes, Encryption is done at the application layer using the AES-256 algorithm. AES-256 is a symmetric key encryption algorithm that uses 128-bit blocks and 256-bit keys.
We encrypt all the media stored in the
file upload,
image,
signature,
audio, and
video in your Zoho Creator applications. Also, when you're using fields to capture any sensitive, confidential, or personally identifiable information (PII), you can add another layer of protection by enabling the
encrypt data field property.
In addition to the application-layer encryption, full-disk encryption is in place at our IN (India), AU (Australia), and EU (Europe) datacenters.
Learn more.Is my data encrypted during transmission?
Yes, Zoho Creator encrypts data during transmission using industry-standard encryption protocols (such as SSL/TLS), ensuring that your data remains secure while being transferred over networks. We mandate all connections to our servers use Transport Layer Security (TLS 1.2/1.3) encryption with strong ciphers.
Learn more.Who can access my data?
Access to your data within Zoho Creator is strictly controlled based on user roles and permissions that you define. Only authorized users you add to the application with the appropriate permissions can access and manipulate data within your Zoho Creator applications. We use technical access controls and organizational procedures to prevent staff from randomly accessing user data. To reduce the danger of data disclosure, we follow the principles of least privilege and role-based access control.
Learn more.Where is my data stored?
Your data is securely stored in geographically distributed data centers operated by Zoho Corporation. These
data centers are located across various regions globally to ensure redundancy, resilience, and compliance with data sovereignty requirements.
How is my data stored?
Zoho Creator ensures the secure storage of your data through robust infrastructure and storage solutions. Your data is securely stored within a dedicated space, which is logically segregated from others within our infrastructure, exclusively for your organization's use. This segregation ensures the confidentiality and integrity of your data.
- Sign in to Zoho Creator
Related FAQ Pages
- Zoho Creator
- Setup process
- Pricing Plans