Enterprise Security
At CreatorIQ, your security is our No. 1 priority. That’s why we take extra steps to ensure data protection and privacy for our enterprise clients. We combine enterprise-grade security features with comprehensive audits of our applications, systems, ensuring that customer data is protected.

Certification
- Scale your business
- Optimize your influencer marketing program
- Outpace your competitors
- Increase your ROI
Data Center Security
CreatorIQ uses world-leading security solutions to secure our service so your data can be kept safe. Our systems are hosted on multiple Availability Zones at Amazon Web Services. This allows us to provide a reliable service, and keeps your data available whenever you need it. These data centers employ leading physical and environmental security measures, resulting in highly resilient infrastructure. For more information about their security practices, see the AWS security page


Business Continuity and Disaster Recovery
CreatorIQ is committed to providing continuous and uninterrupted service to all its customers. CreatorIQ's organization has the capability to operate its critical business functions during emergency events. We have established disaster recovery and business continuity plans, and consistently backup customers’ data every day. All backups are encrypted and retained for 35 days. Our Disaster Recovery Plan is tested at least twice a year to assess its effectiveness, and to keep the teams aligned with their responsibilities in case of a service interruption.
Infrastructure and Network Security
As stated above, CreatorIQ platform is hosted across multiple AWS Availability Zones. Furthermore, our infrastructure is protected using multiple layers of defense mechanisms, including:
- Firewalls for enforcing IP whitelisting and access through permitted ports only to network resources
- A web application firewall (WAF) for content-based dynamic attack blocking
- Malware protection
- Comprehensive logging of network traffic, both internal and edge
- Сomplex approach to vulnerability management
- Logging and monitoring all changes
