3-Tier Security Model

Centroy security


We take security seriously 

It's more than data. It's your business. 


At Centroy, the security of your data is our highest priority. We use strict security policies, military-grade encryption, and world-class data centers to protect your personnel information from unauthorized access, disclosure, alteration, and destruction.

Our data centers are SAS type II certified. Our software is battle tested. We have strong role permissions that control what member have access to. Our employees are held to the highest scrutinization. When you evaluate other collaboration web services make sure they stack up to Centroy's standards.

new Customized strong password requirements for users (e.g. length of pw, characters, expiration, etc)
Custom time automated log-out based on user inactivity.


Our Privacy Commitment
  • You own your information. Not us.
  • We will never sell your information to anyone..
  • We will never share your information with anyone unless you explicitly tell us to.
  • We will never sift through your information to target advertising.
  • We have no rights to your information if you leave the service.


For more information on data privacy, please read our Privacy Policy.
Physical Security 

When you use the cloud, you probably won't know exactly where your data is hosted. In fact, you might not even know what country it will be stored in. Ask providers if they will commit to storing and processing data in specific jurisdictions, and whether they will make a contractual commitment to obey local privacy requirements on behalf of their customers,. Centroy guarantees money back 99.9% availability uptime. Our data centers are located in fault tolerate SAS type II data centers in Dallas, TX and then synchronously remotely mirrored to Waltham, MA for disaster recovery.


System Security

Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn't a cure-all. Find out what is done to segregate data at rest. Centroy provides evidence that encryption schemes were designed and tested by experienced specialists. Encryption accidents can make data totally unusable, and even normal encryption can complicate availability. 


Operational Security

Even if you don't know where your data is, a cloud provider should tell you what will happen to your data and service in case of a disaster. Any offering that does not replicate the data and application infrastructure across multiple sites is vulnerable to a total failure. All of your data is triple mirrored. Primary data is encrypted and located in a Type II data center in Dallas, Tx.