Dispatch security

Popular Questions

Secured Decryption Keys

Of course, Dispatch has the decryption keys on hand so we can use the credentials but they are stored and maintained separately.

Encrypted ​Access Credentials

Access credentials (like API keys, tokens, and passwords) held by Dispatch are encrypted with AES and stored in our encrypted databases. 

Secured Request Logs

All debug logs censor credentials (API keys, tokens, etc.) so they are not viewable in raw request logs.

Military-Grade encryption

The credentials that you use to connect your Customer Systems to the Dispatch Platform are protected with Military-Grade encryption.

Dispatch Security

The Method to Our Security

Certified Offsite Data Centers

Our ISO/IEC 27001 certified offsite data centers provide on-site security personnel, 24/7/365 video surveillance and restricted physical access.

Server Location

Our application servers are logically separated from servers that store customer data.

Core API

Our Dispatch Core API is built according to secure development best practices with security reviews incorporated throughout the design, prototyping and deployment process.

Encrypted Data

Dispatch encrypts data in-transit and at-rest using AES 256-bit symmetric cryptography with forward secrecy exchange. Data storage and processing are performed on servers within an isolated network segment within AWS which are monitored by our own security staff 24/7/365 and audited by nettitude.

An Open Letter from Dispatch

Our Security Promise

At Dispatch, customer trust is key part of our business. We deliver services to more than one million active users, including enterprises, service providers, and customers. Our customers include home owners, tenants, and land lords, who trust us with some of their sensitive information.

We know customers care deeply about privacy and data security. We have developed a security assurance program using global privacy and data protection best practices in order to helping customers establish, operate, and leverage our security control environment. These security protections and control processes are independently validated by multiple third-party independent assessments. What does this all mean? It means no one can access our content, unless we want them to.