What are the information security protections that exalate provide

As in summary - I’m concerned on the safety of my information that will go over exalate pipes.

Great question! Exalate takes information security seriously and implements several protections to keep your data safe as it moves between systems. Here’s a quick overview of the main security measures:

  • End-to-End Encryption: Data transferred between connected instances is encrypted using HTTPS/TLS, ensuring it’s protected in transit.
  • Granular Access Control: You can control who has access to Exalate and what data is shared, using permissions and roles within your connected platforms.
  • Data Filtering: Exalate lets you define exactly which fields and data are synchronized, so you never have to send more than you want.
  • On-Premise Option: If you’re extra cautious, you can deploy Exalate on your own infrastructure, keeping everything behind your firewall.
  • Audit Logs: Exalate maintains logs of synchronization activity, so you can track what’s happening and when.
  • No Data Storage: Exalate doesn’t store your synchronized data long-term; it just passes it through.

For a detailed breakdown, check out the official documentation on Exalate’s security approach.

You can rest assured that Exalate is designed with security in mind, giving you control and transparency over your data flows.