Trust in Circulator

When it comes to email marketing security, there is no end to our work. We work directly with our customers to ensure best of breed security and protection.

Data Security

Processes and systems necessary to develop, operate, and maintain Circulator’s application comply with globally recognised best practices and regulations for data security and privacy. Our platform is trusted and used by companies where data security & privacy is a priority.

ISO27001 Certification

Circulator is committed to information security and maintains certification to ISO 27001 the International Standard for Information Security Management. This covers requirements for information security management systems, providing a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process.

Security Monitoring

Both Circulator and our data-centre security team monitor internal and external security events and implements corrective actions. All systems access are logged and tracked for auditing purposes. Application access & data logs are collected and analysed according to our security procedures.

Platform Protection

Every software release is tested by QA and security teams for full scope of OWASP security risks. Our web login page and API protects against brute force attacks. Application access rights are configurable to your needs and can be managed by your administrator, Circulator has 7 different levels of access rights. Application vulnerability threat assessments and penetration testing are carried out on a regular basis.

Technology Infrastructure

Our technology is securely hosted at top-tier data centres. Our in-house technical support team ensure that it stays up and running 24/7, providing 100% uptime to our customers. Both Circulator and our data-centre security team monitor internal and external security events and implements corrective actions.

Encryption and authentication

We use a range of industry-standard encryption and authentication techniques to protect data as it traverses our systems.

Two Step Authentication (2FA)

As part of our commitment to protecting our customer’s data and continually striving to be the best in class, we have implementing 2FA. This additional security measure immediately neutralises the risks associated with compromised passwords. 2FA is a security system that will require two separate, distinct forms of identification to access Circulator’s application.

"The support and turnaround times working with Circulator are refreshing. We have access to an account manager that knows and understands our business which is key to the partnership."

Clare McDonagh
IT Manager

Don't get left behind

Increase new customer acquisition, reduce renewal rates and improve your customer experience.

Book a Demo
Privacy Preferences

When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalised web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. Blocking some types of cookies may impact your experience of the website.
Privacy Policy | Cookie Policy

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.