CLOUD SECURITY DELIVERED

Protecting your technical data is our top priority. We invest heavily in the security and resiliency of every component within the Rescale ecosystem - our data centers, our software platform, and day-to-day operations as a business. As a result, Rescale complies with the strictest industry standards for security and data protection across every step of the user experience.

Chat with an Expert

Initial Entry

Secure access and login for all users

Authentication

Password complexity and identity verification

SSL Encryption

Client-side 256-bit AES SSL encryption

Data Protection

Data backed up and encrypted at rest

Cluster Privacy

Run on isolated clusters protected by firewall

Security Leadership in Cloud Simulation

Here's some insight into our commitment to security. For more information, please contact security@rescale.com or call 1-855-RESCALE (1-855-737-2253)

Minimum Rescale compliance standards

Service Organization Controls (SOC) 2, Type 2 Attested

The SOC 2 report is an attestation report that expands the evaluation of controls to the criteria set forth by the American Institute of Certified Public Accountants (AICPA) Trust Services Principles. These principles define leading practice controls relevant to security, availability, processing integrity, confidentiality, and privacy applicable to service organizations such as Rescale. This report provides additional transparency into Rescale's security based on industry standards and further demonstrates our commitment to protecting customer data.

International Traffic in Arms Regulations (ITAR) Compliant

Rescale supports US International Traffic in Arms Regulations (ITAR) compliance. Companies subject to ITAR export regulations, such as many of Rescale's customers in the aerospace industry, must control unintended exports by restricting access to protected data to US Persons and restricting physical location of that data to the US. Rescale works with partners to provide an end-to-end environment physically located in the US and where access is limited to US Persons, thereby allowing qualified companies to transmit, process, and store protected articles and data subject to ITAR restrictions.

Cloud Security Alliance (CSA) Registered

In 2011, the Cloud Security Alliance (CSA) launched STAR, an initiative to encourage transparency of security practices within cloud providers. The CSA Security, Trust & Assurance Registry (STAR) is a publicly available registry that has information about the control programs of a number of cloud-based organizations. This free registry allows consumers to assess the security of cloud providers they are considering contracting with. In order to provide our customers with as much information about security as possible, Rescale has filled out the CSA Consensus Assessments Initiative Questionnaire (CAIQ).

HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) of 1996 ensures the security and privacy of Protected Health Information (PHI), especially important for health and biomedical projects. Rescale has achieved HIPAA certification from 2017 onwards. Cantact us for specific regional coverage and more information.

Contact us for more information on Rescale security measures

Chat with an Expert