See how 420+ marketing leaders are generating pipeline. Get the report.

Security Center

RevSure, we take the safety of customer data seriously and give top priority to security. We are committed to protecting our customers from any security threats. Along with SOC2 compliance, below is the excerpt of practices we follow.

RevSure.AI is now SOC2 Type I Compliant

RevSure.AI is now SOC2 Type II Compliant

Data encryption

Data encryption

Customer data isolation

Customer data isolation

API security controlled via API Gateways

API security controlled via API Gateways

API access using secure JWT tokens

API access using secure JWT tokens

SOC2 Type I Compliant

SOC2 Type II Compliant

Masking of PII data (optional)

Masking of PII data (optional)

Access control and organizational security

All our employees and contractors (workers) sign confidentiality agreements before gaining access to our codebase and data. Every employee is trained and made aware of security concerns and best practices for their systems, during onboarding as well as on a periodic basis. We log all access to all accounts by IP address. Access is granted to production servers only as required and is provisioned on an as-needed basis. Access to servers is limited by role based access through IAM that enforces segregation of duties and 2 factor authentication.

Data Location

RevSure.AI servers that persistently store customer data are hosted by Google Cloud Platform (GCP). GCP’s data center is SOC 1, SOC 2 and SOC 3 compliant. GCP also logically isolates each customer’s Cloud Platform data from that of other customers and users. All data is stored and processed in GCP’s ‘us-central-1a’ zone located in the United States.

All GCP data center facilities include

Strict Access Security

  • Custom-designed electronic access cards
  • Alarms
  • Vehicle access barriers
  • Perimeter fencing
  • Metal detectors
  • Biometrics
  • Data Center floor features laser beam intrusion detection


  • 24/7 high resolution interior and exterior cameras that can detect and track intruders
  • Access logs
  • Activity records
  • Camera footage is available in case of incident


  • Patrolled by experienced security guards
  • Rigorous background checks and training

Power Availability

  • Redundant Power Systems
  • Environmental controls
  • Diesel engine backup generators
  • Cooling systems
  • Fire Detection and Suppression equipment

For further information on GCP Security and Compliance refer the following links

Data Isolation and Encryption

Customer data is secured  in transit using TLS and encrypted at rest within the application. RevSure.AI also logically separates data across accounts and access to your data is protected by strong authentication and authorization controls.

Data at Rest

Your data is encrypted using the 256-bit Advanced Encryption Standard (AES-256), or better, with symmetric keys: that is, the same key is used to encrypt the data when it is stored, and to decrypt it when it is used. These data keys are themselves encrypted using a key stored in a secure keystore, and changed regularly. Further details may be found below

Data in Transit

When a user visits a website or application which has instrumented the RevSure.AI SDK, details of their interactions are captured and sent to RevSure.AI through API calls secured over HTTPS/HTTP, based on configurations set by the customer. All of our other APIs and websites use HTTPS exclusively. All data transferred over HTTPS is encrypted. RevSure.AI uses SHA-2 compliant cipher suites to secure data in transit.  Further, the data is encrypted and authenticated in transit at one or more network layers when data moves outside physical boundaries not controlled by Google or on behalf of Google. All our servers are hosted within a Virtual Private Cloud with fine grained security control. Within our datacenter VPC’s, data may be transferred unencrypted. Further details may be found below


Customer data is stored in separate dataset and customer must have access to APIs (web UI access via username and password) to be able to access the data. This provides logical separation between data belonging to multiple clients. RevSure.AI is the sole tenant on our infrastructure.

Application Security

We maintain a robust application security program, covering the following

  1. During software design through security reviews and risk assessment
  2. During implementation through security development training for employees and secure code review guidelines
  3. During deployment through strict manual and automated code review requirements
  4. Customer passwords are hashed and stored using the pbkdf2 algorithm

Disaster recovery

Our disaster recovery plans require that data in the production environment be frequently snapshotted and stored durably in multiple geographic locations in the US  are maintained  for  the  duration  of  the  customer  relationship  and  for  one  month  after  the termination of an agreement unless otherwise specified or required by law.

Signup to know more about RevSure and Sales Pipeline Readiness

Preview RevSure