Middleware Logos
  • Product
  • Solutions
  • Pricing
  • Docs
  • Learn
Log InGet Started Free

Middleware Cookie policy

Cookie policy Middleware

Trusted by leading companies

Bardeen Generation ESports Hotplate ActiveLoop MarkoVML invopop Brainboard FinFlex CloudChipr MindOrigin Monetizenow Cleardemand Bardeen Generation ESports Hotplate Bujeti ActiveLoop
Bardeen Generation ESports Hotplate ActiveLoop MarkoVML invopop Brainboard FinFlex CloudChipr MindOrigin Monetizenow Cleardemand Bardeen Generation ESports Hotplate Bujeti ActiveLoop
  • Our Security Commitment
  • Organizational Security & Compliance
  • Personnel Security & Training
  • Physical Security
  • Security by Design
  • Infrastructure Security
  • Application Security

content-icons Our Security Commitment

Middleware is dedicated to protecting customers’ data and continuously improves its information security management practices. We ensure appropriate confidentiality, privacy, integrity, and availability practices, aligning with SOC2 Trust Service Principles.

content-iconsOrganizational Security & Compliance

Middleware adheres to regulations and codes of conduct outlined by SOC2 Trust Service Principles (Type I & II), HIPAA, GDPR, and Privacy Shield Principles. We maintain formal IT policies and procedures for physical security, logical access, operations, change control, and data communication standards.

content-iconsPersonnel Security & Training

Our workforce, including partners, employees, and contractors, undergoes security and privacy training upon hire and semi-annually. Training covers device security, acceptable use, malware prevention, data privacy, incident reporting, and data breach procedures. Employees acknowledge confidentiality terms annually, and security issues are reported to the Compliance team immediately.

content-iconsPhysical Security

Middleware is hosted on Amazon Web Services (AWS) facilities in Ohio, USA, providing robust physical data center security and environmental controls. Our corporate offices require badge access, video surveillance, and visitor sign-in.

content-icons Security by Design

We adhere to OWASP Top 10 to categorize risks and ensure secure development practices. All updates require review prior to deployment, and change control requirements apply to sensitive data storage.

content-icons Infrastructure Security

Middleware’s network, infrastructure, and architecture have multiple protection layers to ensure the highest levels of security and control, including:

1. Access Control

Access to our production networks is controlled through multi-factor authentication over an HTTPS encrypted protocol. Strict firewall rules restrict access to vulnerable ports, ensuring secure and limited access to the production environment. We also utilize intrusion detection systems in our corporate network to identify potential security threats.

2. Login Security

Middleware has documented and implemented internal mechanisms to stop processing upon specific data subject requests, including for direct marketing purposes.

3. Logical Access

Access to data, system utilities, and program source code libraries are controlled and restricted to authorized users who have a legitimate business need. Responsibilities and duties are well segregated to avoid repudiation and incompatibility of responsibilities.

4. Datacenter

Middleware services are hosted in an advanced data center operated by a recognized industry leader, Amazon Web Services (AWS). Our vendor adheres to the highest industry standards of quality, security, and reliability and continuously monitors the environment using automated compliance checks based on AWS best practices and industry-recognized standards.

content-icons Application Security

Middleware’s network, infrastructure, and architecture have multiple protection layers to ensure the highest levels of security and control, including:

1. Vulnerability Assessment and Penetration Testing

Vulnerability scans are performed at least quarterly on the environment to identify control gaps and vulnerabilities. Found vulnerabilities are resolved within a timeframe by our security team.

A third party performs annual penetration testing to identify and exploit vulnerabilities within the environment.

2. Incident Response and Data Breach

Middleware has documented incident response and escalation procedures for reporting security incidents, adopted to guide users in identifying, reporting, and mitigating failures, incidents, concerns, and other complaints.

When security events are detected, they are escalated to the respective response team, with a response time of 2 hours. We notify the supervisory authority of Personal Data Breach within 72 hours of becoming aware of the breach.

3. Data Encryption in Transit and at Rest

All data sent to or from Middleware is encrypted in transit using AES256 bit encryption. Our API and application endpoints are TLS/SSL only and score an “A+” rating on Qualys SSL Labs’ tests.

Middleware uses end-to-end encryption for Data in-transit which ensures that only communicating users can read what is sent, and nobody in between, even Middleware.

Middleware uses end-to-end encryption for data in transit, ensuring that only communicating users can read what is sent, and nobody in between, even Middleware.

Middleware uses a Security Hash Algorithm (SHA2) for all password entries. Middleware stores customers’ sensitive data, such as name, email, phone numbers, remarks, and chat transcripts, in a MySQL Database.

Data is encrypted automatically, in real-time, prior to writing to storage. As a result, hackers and malicious users are unable to read sensitive data from tablespace files, database backups, or disks.

4. Backup and Disaster Recovery

Middleware ensures that customers can balance the need to store backups at multiple locations in case of a disaster with the need to keep their data out of certain geographies. AWS provides clear data maps and geographic boundary information for all data centers. The disaster recovery plan is tested annually.

5. Data Collection & Disposal

As an Application Service Provider, Middleware collects personal information, such as name and contact details, chat, messaging transcripts, and information related to browsing on behalf of the brand and use of our app.

Customer data will be deleted from Middleware systems upon termination of account or data retention expiration deadlines. Middleware hard deletes all information from currently running production systems. Backups are destroyed within 15 days. Middleware follows industry standards and advanced techniques for data destruction.

6. Bug Bounty Program

Our number one priority is customer security. We’re working with security researchers worldwide to make our customers more secure. Middleware is pleased to recognize security researchers who have helped make Middleware safer by finding and reporting security vulnerabilities.

The Middleware Bug Bounty Program encourages researchers to report vulnerabilities they’ve discovered to our security and development team. We reward researchers for submitting their findings. If you’re a security researcher and have found a vulnerability in our service, please report it to [email protected]

A multi-layered approach is implemented by Middleware to support its People, Process, and Technological security requirements. If you want more advice and help, get in touch with our Compliance team at [email protected]

Optimize More, Worry Less With Middleware

Get StartedView Pricing
Product
  • Infrastructure Monitoring
  • Log Monitoring
  • APM
  • Metrics
  • Distributed Tracing
  • Database Monitoring
  • Real User Monitoring
  • Synthetic Monitoring
  • Container Monitoring
  • Serverless Monitoring
  • LLM ObservabilityNew Feature
  • Browser TestingNew Feature
Our Platform
  • Overview
  • Unified Experience
  • Alerts
  • Query Language
  • Pipeline
  • Integrations
  • Session Replay
  • Error Tracking
  • Continuous Profiler
  • Query GenieNew Feature
Our Solution
  • Technology
  • AWS
  • Azure
  • GCP
  • Comparison
    • Datadog Alternative
    • Newrelic Alternative
    • Dynatrace Alternative
    • Grafana Alternative
Resources
  • Customers
  • Community
  • Events
  • Whitepapers
  • Newsletter
  • Media Coverage
  • Blog
  • Help-Docs
  • API-Docs
  • Product Updates
  • Podcasts
Company
  • About Us
  • Careers
  • Partner
  • Contact Us
  • Security
    • Security
    • GDPR
Middleware’s white logo
GDPRSOC-2 Type IIHIPAA
social-icon
social-icon
social-icon
social-icon
social-icon
social-icon
social-icon

©2025 Middleware, All rights reserved

  • Privacy-Policy
  • Terms & Conditions
  • Cookie-Policy