Kaseya Trust Center

In a world full of cyber threats, learn how Kaseya keeps IT safe, protected, and secure.

Report a Security Incident or Vulnerability
quote

“The Kaseya Community is based on Trust. Our commitment to privacy and cybersecurity revolves around you and your data.”

Fred Voccola
CEO, Kaseya

Security Standards & Policies

Kaseya’s security framework is based on trust services criteria for security: integrity, availability, and confidentiality. Kaseya products are independently audited to SOC 2 Type 2 and the underlying data centers are certified to ISO 27001. Our security policies and standards are verified annually through external third-party audits.

Security Incident Response

Kaseya adheres to a strict playbook for rapid response as soon as suspicious activity is reported and validated. Kaseya’s policy is to isolate the incident and limit impact while establishing transparent communication channels as the source of truth. Kaseya partners with relevant authorities to identify bad actors and works with independent security researchers to mitigate any vulnerability and resolve the exploit. We’re appreciative of the research community and welcome productive cooperation in eliminating threats, vulnerabilities or exploits. If you have a vulnerability or incident to disclose, please provide details to security[@]kaseya[dot]com.

Vulnerability Disclosure Policy

Product Security

Kaseya’s IT Complete solution consists of 27 unique solutions that are purposely compartmentalized from each other to ensure the highest level of security, reliability, and continuity for our customers.

Each IT Complete module is developed, monitored, and secured independently and audited for SOC 2 Type 2 compliance.

  • Multi-factor Authentication (MFA)
    Access to Kaseya products is controlled using MFA n to enhance security protection and prevent system usage via compromised credentials.
  • Encryption
    Kaseya products utilize industry standard strong encryption for all traffic in transit and encrypted customer data at rest.
  • Role-Based Access Controls
    Kaseya products provide customers with the ability to implement role-based access control on the principle of least privilege to manage and secure access.

Compliance Qualified

Compliance starts with design. All Kaseya products and services adhere to strict governance, risk management, and compliance protocols and regulations. These include SOC 2 Type 2, ISO 27001 Certified Datacenters, HIPAA, GDPR, and CCPA. Attestation and other governance, compliance, and risk management inquiries can be sent to GRCOperations[@]Kaseya[dot]com.

Download Kaseya's SOC 3 Report

Legal Assurance

Kaseya’s legal policies and best practices are designed and enacted with our customers’ safety, protection, and well-being top of mind. We exercise complete transparency with our Legal Documents and Statements, including comprehensive terms and conditions and EULA. Legal inquiries can be sent to legal[@]Kaseya[dot]com.

Privacy: Your Data Is Always in Your Control

All Kaseya products and services operate in accordance with major privacy acts and best practice procedures around the globe to ensure our customers’ data is safe, protected and in adherence with current law. These include, but are not limited to, CCPA and GDPR, CAN-SPAM, Privacy Shield, DRA, DPA, as well as our own Terms and Policy Statements. As new and revised privacy laws are being introduced all the time, Kaseya’s appointed Data Protection Officer operates on the front line to ensure our policies and procedures are always up to date and in line with active law around the globe. Privacy inquiries can be sent to DPO[@]Kaseya[dot]com.

Report a Security Incident

Email our security team to report the incident

Contact Us

Help Your Customers

Kaseya empowers customers to securely move forward working with their customers

Powered Services

Awards & Recognitions

Kaseya IT Complete suite of products has received hundreds of awards and accolades over the last few years

As the only purpose-built, comprehensive IT Solution for small-to-medium businesses, we are taking the IT industry by storm and are thrilled to be acknowledged for the smart, innovative tools and solutions our customers depend on every single day.

Here are few notable recent mentions across our primary product suites:

Graphus Anti-Phishing
Best New Solution – ChannelPro
Outstanding Security Automation in Computing AI and Machine Learning – Computing UK
Tech Innovator – CRN
ID Agent Credentials Monitoring and Security Training
Breach and Attack Simulation (BullPhish ID) – Cybersecurity Excellence Awards
Best Security Awareness Training Solution – ChannelPro Readers Choice Awards
Best In Show – ChannelPro SMB Forum
IT Glue
Best Productivity Solution – ASCII Cybersecurity Excellence Awards
Best in Show – DattoCon
Password Management Tool of the Year (2nd place) – Reseller Choice Awards for Canada
Passly
Most Innovative Product, Threat Protection – American Cyber Awards
Rapidfire Tools Audit and Compliance
Best Product of the Year – American Cyber Awards
Best MSP Solution – American Cyber Awards
Cyber Security Excellence Awards
Unitrends
Business Continuity/Disaster Recovery (Gold) – Cybersecurity Excellence Awards
Best Hardware and Software Service – Steve Awards
Best Storage Solution – Database Trends and Applications
VSA
Best Remote Monitoring and Management (RMM) – ChannelPro Readers Choice Awards
IT Assessment Tool of the Year (2nd place) – Reseller Choice Awards for Canada
Most Innovative Cybersecurity Company – Cybersecurity Excellence Awards
Spanning
Best Data Security Solution – Database Trends and Applications
Top 5 SaaS Backup – Office 365 Online