{"id":5648,"date":"2023-09-11T13:21:28","date_gmt":"2023-09-11T12:21:28","guid":{"rendered":"https:\/\/abusix.com\/?page_id=5648"},"modified":"2023-12-18T15:33:48","modified_gmt":"2023-12-18T15:33:48","slug":"security","status":"publish","type":"page","link":"https:\/\/abusix.com\/security\/","title":{"rendered":"Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5648\" class=\"elementor elementor-5648\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7460b2a2 e-con-full e-flex e-con e-parent\" data-id=\"7460b2a2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3c9ad7e5 e-con-full e-flex e-con e-child\" data-id=\"3c9ad7e5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-244f84a9 elementor-widget__width-inherit elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"244f84a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a85a1ec elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-heading\" data-id=\"2a85a1ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security at Abusix<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66c02a52 elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"66c02a52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The world\u2019s leading Security teams rely on Abusix to automate and support their mission-critical processes.<\/span><\/p><p><span style=\"font-weight: 400;\">They trust Abusix to operate securely and to protect their data at all times. We take this trust seriously.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">Here, you\u2019ll find an overview of some measures we\u2019ve implemented to ensure security and privacy are critical building stones of our culture and ingrained in our daily operations.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66c8f6c3 elementor-widget__width-inherit elementor-invisible elementor-widget elementor-widget-image\" data-id=\"66c8f6c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1680\" height=\"427\" src=\"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg\" class=\"attachment-full size-full wp-image-5653\" alt=\"\" srcset=\"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg 1680w, https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100-300x76.jpg 300w, https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100-1024x260.jpg 1024w, https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100-768x195.jpg 768w, https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100-1536x390.jpg 1536w, https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100-600x153.jpg 600w\" sizes=\"(max-width: 1680px) 100vw, 1680px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2134865 e-flex e-con-boxed e-con e-parent\" data-id=\"2134865\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b54d1d9 elementor-widget elementor-widget-spacer\" data-id=\"b54d1d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49d85a4 e-flex e-con-boxed e-con e-parent\" data-id=\"49d85a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2791b97 e-con-full e-flex e-con e-child\" data-id=\"2791b97\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cba09f2 elementor-toc--minimized-on-tablet elementor-widget elementor-widget-table-of-contents\" data-id=\"cba09f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;headings_by_tags&quot;:[&quot;h3&quot;,&quot;h4&quot;,&quot;h5&quot;,&quot;h6&quot;],&quot;exclude_headings_by_selector&quot;:[],&quot;marker_view&quot;:&quot;numbers&quot;,&quot;no_headings_message&quot;:&quot;No headings were found on this page.&quot;,&quot;minimize_box&quot;:&quot;yes&quot;,&quot;minimized_on&quot;:&quot;tablet&quot;,&quot;hierarchical_view&quot;:&quot;yes&quot;,&quot;min_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;min_height_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"table-of-contents.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__header\">\n\t\t\t\t\t\t<h3 class=\"elementor-toc__header-title\">\n\t\t\t\tTable of Contents\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--expand\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__cba09f2\" aria-expanded=\"true\" aria-label=\"Open table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-down\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M207.029 381.476L12.686 187.132c-9.373-9.373-9.373-24.569 0-33.941l22.667-22.667c9.357-9.357 24.522-9.375 33.901-.04L224 284.505l154.745-154.021c9.379-9.335 24.544-9.317 33.901.04l22.667 22.667c9.373 9.373 9.373 24.569 0 33.941L240.971 381.476c-9.373 9.372-24.569 9.372-33.942 0z\"><\/path><\/svg><\/div>\n\t\t\t\t<div class=\"elementor-toc__toggle-button elementor-toc__toggle-button--collapse\" role=\"button\" tabindex=\"0\" aria-controls=\"elementor-toc__cba09f2\" aria-expanded=\"true\" aria-label=\"Close table of contents\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-chevron-up\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M240.971 130.524l194.343 194.343c9.373 9.373 9.373 24.569 0 33.941l-22.667 22.667c-9.357 9.357-24.522 9.375-33.901.04L224 227.495 69.255 381.516c-9.379 9.335-24.544 9.317-33.901-.04l-22.667-22.667c-9.373-9.373-9.373-24.569 0-33.941L207.03 130.525c9.372-9.373 24.568-9.373 33.941-.001z\"><\/path><\/svg><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<div id=\"elementor-toc__cba09f2\" class=\"elementor-toc__body\">\n\t\t\t<div class=\"elementor-toc__spinner-container\">\n\t\t\t\t<svg class=\"elementor-toc__spinner eicon-animation-spin e-font-icon-svg e-eicon-loading\" aria-hidden=\"true\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M500 975V858C696 858 858 696 858 500S696 142 500 142 142 304 142 500H25C25 237 238 25 500 25S975 237 975 500 763 975 500 975Z\"><\/path><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fe2d1c e-con-full e-flex e-con e-child\" data-id=\"8fe2d1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab9f19d elementor-widget elementor-widget-text-editor\" data-id=\"ab9f19d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><b>Compliance\u00a0<\/b><\/h3><p><span style=\"font-weight: 400;\">Our information security program is aligned with the industry-accepted framework, SOC2. SOC2 compliance means a company has established and follows strict information security policies and procedures. These policies cover customer data&#8217;s security, availability, processing, integrity, and confidentiality. We maintain SOC Type II compliance and are audited annually.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">\u200dOur compliance stance is an essential part of how we protect customer data; however, we recognize that being compliant is not the same as being secure. As such, we have implemented (and will continue to) a range of additional security controls that provide our customers with further assurance that we prioritize security within the Abusix products and organization.<\/span><\/p><h3><b>Security in the product\u00a0<\/b><\/h3><p><span style=\"font-weight: 400;\">We provide a number of security features within the Abusix Platform, which help ensure the confidentiality, integrity, and availability of customer information.<\/span><\/p><h4><b>SSO\/SAML\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">Abusix supports SSO\/SAML by default across all plans. We encourage customers to enable single sign-on in their Abusix tenant.<\/span><\/p><h4><b>Granular control over data retention\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">We believe customer data is a liability and provide easy-to-use platform features that ensure it\u2019s only retained in the platform for as long as is required.<\/span><\/p><h3><b>Security in the organization\u00a0<\/b><\/h3><p><span style=\"font-weight: 400;\">We place equal importance on security in the Abusix products and security within the Abusix organization. Below is a non-exhaustive list of security measures we\u2019ve implemented at an organizational level.<\/span><\/p><h4><b>Access to production systems\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">We restrict access to production systems to a handful of employees. No contractors or 3rd-parties have access to production. Customer data is prohibited from leaving our production environment. The list of employees with access to production is regularly reviewed.<\/span><\/p><h4><b>Security and Privacy Council\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">We have established a cross-functional group, led by the company CEO, that meets regularly to discuss security and privacy matters. The agenda for Security and Privacy Council meetings typically includes a review of recent incidents, security implications of upcoming features, and ongoing compliance efforts.<\/span><\/p><h4><b>Awareness training\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">Every Abusix employee undergoes security awareness training at least annually after joining.<\/span><\/p><h4><b>Security automation\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">We leverage security automation extensively to alert on suspicious activity across prod and corp environments.<\/span><\/p><h3><b>The Abusix Security Posture\u00a0<\/b><\/h3><p><span style=\"font-weight: 400;\">You can check Abusix Security Posture at <a href=\"https:\/\/trust.abusix.com\/\">https:\/\/trust.abusix.com <\/a><\/span><span style=\"font-weight: 400;\"><br \/><\/span><span style=\"font-weight: 400;\">If you have additional questions, please reach out to <\/span><a href=\"mailto:security@abusix.com\"><span style=\"font-weight: 400;\">security@abusix.com<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/a><span style=\"font-weight: 400;\">Due to the sensitivity of the information, we might require you to sign an NDA.<\/span><\/p><h3><b>Reporting security vulnerabilities\u00a0<\/b><\/h3><h4><b>Responsible Disclosure\u00a0\u00a0<\/b><\/h4><p><span style=\"font-weight: 400;\">As a security company, we commit to providing users a secure and trusted platform. We value security researchers and others who keep a watchful eye and responsibly disclose security issues. If you find any security vulnerabilities, please disclose them to us via <a href=\"mailto:security@abusix.com\">security@abusix.com<\/a>.<\/span><\/p><p><span style=\"font-weight: 400;\">We ask that you adhere to the following guidelines:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not disclose the vulnerability to 3rd parties<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not violate any laws<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not disrupt services (DoS\/DDoS)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not access, modify, or destroy any accounts or data that do not belong to you.<\/span><\/li><\/ul><h4><b>Out of Scope\u00a0\u00a0<\/b><\/h4><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">HTTPS \/ TLS security header suggestions<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Direct testing of 3rd parties<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SPF \/ DMARC \/ DKIM \/ DNSSEC suggestions<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Banner\/version disclosure<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Social engineering\/phishing\/spam<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security at Abusix The world\u2019s leading Security teams rely on Abusix to automate and support their mission-critical processes. They trust Abusix to operate securely and to protect their data at all times. We take this trust seriously.\u00a0 Here, you\u2019ll find an overview of some measures we\u2019ve implemented to ensure security and privacy are critical building [&hellip;]<\/p>\n","protected":false},"author":22,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5648","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Security - Cybersecurity Solutions | Email &amp; Network Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abusix.com\/security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security\" \/>\n<meta property=\"og:description\" content=\"Security at Abusix The world\u2019s leading Security teams rely on Abusix to automate and support their mission-critical processes. They trust Abusix to operate securely and to protect their data at all times. We take this trust seriously.\u00a0 Here, you\u2019ll find an overview of some measures we\u2019ve implemented to ensure security and privacy are critical building [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abusix.com\/security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Solutions | Email &amp; Network Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/abusixinc\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-18T15:33:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@abusix\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abusix.com\\\/security\\\/\",\"url\":\"https:\\\/\\\/abusix.com\\\/security\\\/\",\"name\":\"Security - Cybersecurity Solutions | Email &amp; Network Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abusix.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/abusix.com\\\/security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/abusix.com\\\/security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/abusix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/header-abusix-security-100.jpg\",\"datePublished\":\"2023-09-11T12:21:28+00:00\",\"dateModified\":\"2023-12-18T15:33:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abusix.com\\\/security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abusix.com\\\/security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abusix.com\\\/security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/abusix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/header-abusix-security-100.jpg\",\"contentUrl\":\"https:\\\/\\\/abusix.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/header-abusix-security-100.jpg\",\"width\":1680,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abusix.com\\\/security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/abusix.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abusix.com\\\/#website\",\"url\":\"https:\\\/\\\/abusix.com\\\/\",\"name\":\"Cybersecurity Solutions | Email &amp; Network Security\",\"description\":\"Cybersecurity Solutions | Email &amp; Network Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/abusix.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abusix.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abusix.com\\\/#organization\",\"name\":\"Abusix, Inc.\",\"url\":\"https:\\\/\\\/abusix.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abusix.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abusix.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/abusix-footer-logo.svg\",\"contentUrl\":\"https:\\\/\\\/abusix.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/abusix-footer-logo.svg\",\"width\":156,\"height\":40,\"caption\":\"Abusix, Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/abusix.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/abusixinc\",\"https:\\\/\\\/x.com\\\/abusix\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security - Cybersecurity Solutions | Email &amp; Network Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abusix.com\/security\/","og_locale":"en_US","og_type":"article","og_title":"Security","og_description":"Security at Abusix The world\u2019s leading Security teams rely on Abusix to automate and support their mission-critical processes. They trust Abusix to operate securely and to protect their data at all times. We take this trust seriously.\u00a0 Here, you\u2019ll find an overview of some measures we\u2019ve implemented to ensure security and privacy are critical building [&hellip;]","og_url":"https:\/\/abusix.com\/security\/","og_site_name":"Cybersecurity Solutions | Email &amp; Network Security","article_publisher":"https:\/\/www.facebook.com\/abusixinc","article_modified_time":"2023-12-18T15:33:48+00:00","og_image":[{"url":"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@abusix","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/abusix.com\/security\/","url":"https:\/\/abusix.com\/security\/","name":"Security - Cybersecurity Solutions | Email &amp; Network Security","isPartOf":{"@id":"https:\/\/abusix.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/abusix.com\/security\/#primaryimage"},"image":{"@id":"https:\/\/abusix.com\/security\/#primaryimage"},"thumbnailUrl":"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg","datePublished":"2023-09-11T12:21:28+00:00","dateModified":"2023-12-18T15:33:48+00:00","breadcrumb":{"@id":"https:\/\/abusix.com\/security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abusix.com\/security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abusix.com\/security\/#primaryimage","url":"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg","contentUrl":"https:\/\/abusix.com\/wp-content\/uploads\/2023\/09\/header-abusix-security-100.jpg","width":1680,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/abusix.com\/security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abusix.com\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/abusix.com\/#website","url":"https:\/\/abusix.com\/","name":"Cybersecurity Solutions | Email &amp; Network Security","description":"Cybersecurity Solutions | Email &amp; Network Security","publisher":{"@id":"https:\/\/abusix.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abusix.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abusix.com\/#organization","name":"Abusix, Inc.","url":"https:\/\/abusix.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abusix.com\/#\/schema\/logo\/image\/","url":"https:\/\/abusix.com\/wp-content\/uploads\/2020\/09\/abusix-footer-logo.svg","contentUrl":"https:\/\/abusix.com\/wp-content\/uploads\/2020\/09\/abusix-footer-logo.svg","width":156,"height":40,"caption":"Abusix, Inc."},"image":{"@id":"https:\/\/abusix.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/abusixinc","https:\/\/x.com\/abusix"]}]}},"_links":{"self":[{"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/pages\/5648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/comments?post=5648"}],"version-history":[{"count":0,"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/pages\/5648\/revisions"}],"wp:attachment":[{"href":"https:\/\/abusix.com\/wp-json\/wp\/v2\/media?parent=5648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}