Security Practices

Last Updated: 18 May 2018


Conholdate uses Amazon EC2 cloud servers. Using an industry standard like Amazon helps guarantee the security and resilience of the service. Amazon has attained a number of certifications that affirm that they have stringent, working internal controls.

Physical Security

Amazon safeguards the physical security of their servers. Servers are located in non-descript facilities, and critical facilities have extensive setback and military grade perimeter control. Access to data centers requires two-factor authentication at three points.

Data Security

The host operating system is kept secure by internal processes and procedures. The guest operating system is entirely controlled by Conholdate. Amazon administrators do not have access to it. By default, an inbound firewall denies all traffic to the host servers.


Amazon systems are built with extensive redundancy. Conholdate backs up data on a daily basis. All access is logged and tracked for auditing purposes.

Maintaining Privacy

Account passwords are encrypted and filtered out from all application and system logs. Passwords are not visible to anyone.

Sign out from your account to prevent someone from using your computer to access your account without your authorization. Keep your user name and password secure and not to disclose it to any third-party. In case a third-party gains unauthorized access to your account due to any act or omission on your part, you are solely responsible for any loss caused.

Credit Card Safety

Conholdate does not retain any credit card information provided by you. When we charge, such information is transferred directly to, and processed by, our payment gateway.

To protect user information, Conholdate's payment gateway uses the latest 256-bit Secure Socket Layer (SSL) technology for secure transactions. The payment gateway is certified as compliant with card association security initiatives including Payment Card Industry (PCI) and Cardholder Information Security Program (CISP) standards for data protection.

File Retention Policy

Conholdate products run on the customer's own machines and network and do not send any files back to Conholdate for processing and therefore does not have access to them. From time to time a customer may send documents to the support team via the forums for the purpose of diagnosis of technical issues or feature requests. These files are maintained only as long as necessary to complete the required task and the customer can ask to remove these files at any time. If the customer marks the thread as private none of these files are accessible to any person other than the customer and select Conholdate staff.

Concerned About Security?

Read more about the EULA and Privacy Policy. Do you have a question, concern, or comment about Conholdate's security that's not covered here? Ask on the support forums.