Recognizing the critical importance of security for grantmaking organizations, Fluxx proactively protects data and system integrity in our cloud-based solutions. Built on Amazon Web Services (AWS), with its secure infrastructure, our systems undergo thorough audits, and feature best-in-class security measures. This commitment ensures your information is always safe and your Fluxx system is secure.
Fluxx meets rigorous industry standards, including SOC 2 and TX-RAMP
We are committed to implementing industry best practices across all Fluxx services.
Maintain business continuity by safeguarding your data from failures and disasters.
Your data is house in physically secure Amazon Web Services (AWS) facilities across multiple ava.
Secure Network
Logical security is enforced at every level, from usage of Amazon's Virtual Private Clouds (VPC) to leveraging best-in-class Kubernetes security configurations. Intelligent threat detection is provided by AWS GuardDuty, with managed DDoS protection via AWS Shield and data is encrypted in motion via TLS 1.2+ and at rest on disk.
Secure Development
We adhere to a rigorous Secure Development Life Cycle (SDLC) that ensures security considerations are prioritized from initial design through to deployment and maintenance liability zones, with regional hosting available in the US, Europe, Oceania, Canada, and Hong Kong.
Penetration Testing
We partner with reputable security firms for regular internal and external penetration testing. These tests ensure our systems are robust, directly safeguarding customer data from potential vulnerabilities.
Secure Users
Fluxx prioritizes secure and flexible user access, offering robust authentication options. We provide seamless integration with SAML 2.0-supported Single Sign-On (SSO), enabling users to leverage their existing credentials for secure access. To further enhance security, Multi-Factor Authentication (MFA) is also available, adding an extra layer of protection.
Always on and Available
Fluxx guarantees 99.5% uptime and can accommodate heavy grant submission periods without degradation in service. In addition, data is synchronously replicated between data centers, with data backups and server system images stored in separate availability zones.
JOHN MOHR, CIO, MACARTHUR FOUNDATION
2261 Market Street, #4060
San Francisco, CA 94114