Skip to content

Data Safety, Security and Privacy

We protect your data.

Files that our customers upload are stored on servers that use modern techniques to remove bottlenecks and points of failure.

Your data is sent using HTTPS.

Whenever your data is in transit between you and us, everything is encrypted, and sent using HTTPS. Any files you upload to us are stored and encrypted at rest. Project data, comments and text documents aren’t encrypted at rest — they are active in our database.

Sophisticated physical security.

Our state-of-the-art servers are protected by biometric locks and round-the-clock interior and exterior surveillance monitoring. Only authorized personnel have access to the data center. 24/7/365 onsite staff provides additional protection against unauthorized entry and security breaches. Access to each system, network device, and application is limited to authorized personnel, and login details within the event logs are reviewed on a continual basis.

Regularly-updated infrastructure.

Our software infrastructure is updated regularly with the latest security patches. Our products run on a dedicated network which is locked down with firewalls and carefully monitored. While perfect security is a moving target, we work with security experts to keep up with the state-of-the-art in web security.

We protect your privacy

The privacy of your data — and it is your data, not ours! — is a big deal to us. We’ll only ever access your account to help you with a problem or squash a software bug. We’ll never open any uploaded files unless you ask us to. We log all access to all accounts by IP address, so we can always verify that no unauthorized access has happened for as long as the logs are kept.

Find more on our privacy policy here.

User Authentication

Each user in BluInsights has a unique, password-protected account with a verified email address. The password is validated against password policies and stored securely using a strong hashing algorithm with a unique salt for every password.

The BluInsights Support Team is always happy to assist you with any BluInsights-related issues. If troubleshooting or verifying an issue requires support to access your account, that access can be granted only by you. This is enabled by an explicit request that you provide to our support team, allowing support to delve deeper into solving your problem for a limited amount of time. This systemic approach ensures additional confidentiality for your data stored in BluInsights.

Tenant Isolation

BluInsights is a multi-tenant SaaS application. Even though customers are sharing a common IT infrastructure, they are logically segregated so that the actions of one tenant cannot compromise the data or service of another tenant. Each customer's data is kept logically segregated from other tenants when at-rest; and any requests that are processed by BluInsights are tenant-specific so other tenants are not impacted.

BluInsights works by storing a context for each customer. This context includes a range of information linked with that tenant (e.g. which databases the tenant is in, what licenses the tenant has, what features they can access, what projects are authorized, etc.) and unique encrypted credentials.

When a customer accesses BluInsights, this latter uses the tenant ID to collate all required information, which is then linked with any operations the tenant undertakes in the application throughout their sessionThis ensures that one customer tenant does not access data of another tenant – nor for one tenant to affect the service of another tenant through their own actions.

Data Sharing and Role-Based Access Control

A BluInsights project owner manages and controls individual user rights by granting specific types of user permissions. Customer data, including source code files and analysis, can only be accessed by other users within your BluInsights account if those items were specifically shared with them, or if the items were placed in a shared feature.

BluInsights offers flexible data access control setup by allowing project owners to configure customized access roles, which offer the choice of more than 50 different permissions for user actions in BluInsights, and can be used to specify user access levels to certain features, actions and content.

Monitoring User Activities

BluInsights enables customers to get a report with up-to-date projects activity information. This information is accessible directly in the projects and are also shared at a daily basis by email.

18+ years in business.

Security has always been a top priority and we have relentlessly pursued a robust and mature security strategy since the day the company was founded. We’ve been around the block and we’ve seen a lot of companies come and go. Security isn’t just about technology, it’s about trust. Over the past 18 years we’ve worked hard to earn the trust of hundreds of companies worldwide. We’ll continue to work hard every day to maintain that trust. Longevity and stability is core to our mission at Blu Age.

Want to know more? Have a concern? Need to report an incident?

Send us an email if you have other security questions and we’ll get back to you as quickly as we can.