We Care about Security and Privacy
Even though Stack Moxie only creates and collects test data, security, stability and trust are core to our culture and product.
Audits, Vulnerability Assessment & Penetration Testing
Stack Moxie tests for potential vulnerabilities on a recurring basis. We run static code analysis, and infrastructure vulnerability scans.
Stack Moxie leverages 3rd party penetration testing firms several times a year to test the Stack Moxie products and product infrastructure. Contact us to request the Certificate.
Bug bounty program
In addition to our internal processes, Stack Moxie crowd-sources vulnerability assessment with our bug bounty program. Rewards are available for helping us spot potential flaws. Are you interested? Contact us below to request more information.
Sessions between Stack Moxie and integrated applications are protected with in-transit encryption using 2,048-bit or better keys and TLS 1.0 or above. Users with modern browsers will use TLS 1.2 or 1.3.
Web Application and network firewalls
Stack Moxie monitors potential attacks with several tools, including a web application firewall and network-level firewalling. In addition, the HubSpot platform contains Distributed Denial of Service (DDoS) prevention defenses to help protect your site and access to your products.
Software development lifecycle (SDLC) Security
Stack Moxie implements static code analysis tools and human review processes in order to ensure consistent quality in our software development practices.
Stack Moxie products are hosted on Azure, which provides world class security and uptime, including SOC 2 Type II and ISO 27001 certifications, among others. The certified protections include dedicated security staff, strictly managed physical access control, and video surveillance.
Redundancy and Uptime
Stack Moxie leverages redundancy capabilities via the Azure network. We provide 24/6 monitoring and support to make sure that our platform is a trusted source of monitoring and testing for our customers.
Stack Moxie’s patch management process identifies and addresses missing patches within the product infrastructure. Server-level instrumentation ensures tracked software packages use the appropriate versions.
Security Incident Response
Stack Moxie’s security incident process flows and investigation data sources are pre-defined during recurring preparation activities and exercises and are refined through investigation follow-ups. We use world-class incident response process structures to ensure that the right steps are taken at the right time. Request our incident response process documentation.
Please let us know if you would like to request any information about our Security policies and procedures..