What Information Do We Collect?
You can browse most of our site without telling us who you are. In order to start or participate in petitions, or participate in the forums, you are required to register. If you choose to give us personal information, you consent to the transfer and storage of that information on our servers. We may now or in the future collect and store the following personal information:
Email address, physical contact information, and financial information, such as credit card or bank account numbers (financial information is encrypted for your protection);
Transactional information based on your activities.
Community discussions, chats, dispute resolution, correspondence sent to us;
Standard web log information, such as connection information, statistics on page views, traffic to and from our site, ad data, and IP address.
How Secure Is The Information We Collect?
We are committed to industry best practices concerning security to prevent the loss, misuse and alteration of the information in our possession. However, as you know, third parties may unlawfully intercept or access transmissions or private communications, and other users may abuse or misuse your personal information that they collect from the site. Therefore, although we work very hard to protect your privacy, we do not promise, and you should not expect, that your personal information or private communications will always remain private.
How Do We Use Your Information?
We will never resell or redistribute your information without your express permission. You agree that we may use your personal information to:
Provide the services and customer support you request;
Resolve disputes, collect fees, and troubleshoot problems;
Prevent potentially prohibited or illegal activities, and enforce our Site Policies;
Customize, measure and improve our services, content and advertising;
Tell you about targeted marketing, service updates, and promotions based on your specific preferences;
Compare your information for accuracy, and verify it with third parties.
Can we get your data out of our service?
You own your data and retain all rights. We take only alerts and alarm based on the security controls and do detailed analysis using syslog.
How do we ensure that our service is reliable?
We apply best practices in design and operations, such as redundancy, resiliency, BCP andmonitoring—to name a few.
Secure your asset, data and business with best-in-class services that work great for small to mid-sized companies.
Gain enterprise-grade protection and business continuity without the need for an enterprise-sized security department
Enjoy peace of mind with straightforward management functions backed with SLA
Customize security policies for endpoint and datacenter assets to ensure the right level of protection for your data,system files, configuration files, etc.t