Dispatch Security

An Open Letter from Dispatch

Our Security Promise

At Dispatch, customer trust is a key part of our business. We deliver services to more than one million active users, including enterprises, service providers, and customers. Our customers include homeowners, tenants, and landlords, who trust us with sensitive information.

We know customers care deeply about privacy and data security. We have developed a security assurance program using global privacy and data protection best practices in order to help customers establish, operate, and leverage our security control environment. These security protections and control processes are independently validated by multiple third-party independent assessments. What does this all mean? It means no one can access our content unless we want them to.

Frequently Asked Questions

Secured Decryption Keys

Dispatch has the decryption keys on hand so we can use the credentials but they are stored and maintained separately.

Encrypted ​Access Credentials

Access credentials (like API keys, tokens, and passwords) held by Dispatch are encrypted with AES and stored in our encrypted databases.

Secured Request Logs

All debug logs censor credentials (API keys, tokens, etc.) so they are not viewable in raw request logs.

Military-Grade encryption

The credentials that you use to connect your customer systems to the Dispatch Platform are protected with military-grade encryption.

Our Security Methods


Our ISO/IEC 27001 certified off-site data centers provide on-site security personnel, 24/7/365 video surveillance and restricted physical access.

Server location

Our application servers are logically separated from servers that store customer data.

Core API

Our Dispatch Core API is built according to secure development best practices with security reviews incorporated throughout the design, prototyping and deployment process.

Encrypted Data

Dispatch encrypts data in-transit and at-rest using AES 256-bit symmetric cryptography with forward secrecy exchange. Data storage and processing are performed on servers within an isolated network segment within AWS which are monitored by our own security staff 24/7/365 and audited by nettitude.