FAQ
Where is Filestage hosted, and where will my data be stored?
Our platform and your data are hosted in two availability zones (i.e. data centers) in Frankfurt, Germany. In addition, we temporarily deliver uploaded media files worldwide via a content delivery network (CDN) for optimal performance.
How do you manage vulnerabilities and their patches?
We maintain a Patch and Vulnerability Management Policy. This is supported by a procedure for performing periodic vulnerability scans and penetration tests, and prioritizing vulnerability remediation based on risk levels.
How do you manage changes to your platform?
We maintain a Secure Change Management and Development Policy and Secure Software Development Life Cycle. This makes sure that changes are requested, authorized, reviewed, and approved before deployment to production. During review, we assess privacy and security controls against industry best practices such as OWASP Top 10.
How do you manage business continuity and disaster recovery?
We maintain a Business Continuity and Disaster Recovery Policy supported by a procedure for regaining uptime and recovering data from our backups.
How do you manage incidents?
We maintain an Information Privacy and Security Incident and Breach Management Policy. This is supported by a procedure for detecting and reporting incidents, assessing incidents and deciding on a course of action, responding to and recovering from the incident (i.e. implementing the decided course of action), notifying affected parties, learning from the incident, and maintaining evidence of the incident, actions taken, and lessons learned
Does Filestage offer a Data Processing Agreement (DPA)?
We’ve incorporated our DPA into our Master Services Agreement (MSA), so you don’t have to sign it separately. But if this is a requirement from your organization, our Sales team will help.
Does Filestage make use of third parties (i.e. sub-processors)?
At Filestage, we embrace remote working. This means we’re a fully-remote and globally-distributed team that leverages third-party cloud services providers (CSPs) for our products (i.e. hosting and delivering our application, app.filestage.io). We understand that using third-party CSPs carries an element of risk. That’s why we have a robust third-party privacy and security risk management program. As part of our program, we assess each subprocessor’s privacy and security practices before using their services. This assessment includes reviewing their information security management systems and data processing agreements (DPAs). We prefer sub-processors who are GDPR-compliant and certified against industry best practice standards such as ISO 27001. In addition, and where required, we enter into DPAs with each sub-processor.