Endpoint Automation Solutions recognizes that the confidentiality, integrity and availability of information and data created, maintained and hosted by us are vital to the success of the business and privacy of our partners.
As a service provider/product, we understand the importance of clearly communicating our security practices, tools, resources, and responsibilities within Endpoint Automation Solutions so that our customers can feel confident in choosing us as a trusted provider.
This Security Posture highlights high-level details about our steps to identify and mitigate risks, implement best practices, and continuously develop ways to improve.
Founded in 1989
Here are the subprocessors that Endpoint Automation Solutions uses to process data in its infrastructure and business operations.
AnyDesk
IT Management
United States of America
Checkr
Data Privacy
United States of America
Microsoft Teams
Collaboration & Productivity
United States of America
ESET
Security Software
United States of America
Microsoft Azure
IT infrastructure
United States of America
Sharepoint
Collaboration
United States of America
BambooHR
HRMS
United States of America
Office365
IAM providers
United States of America
AWS
IT infrastructure
United States of America