Physical security

EnovaPoint JungleMail cloud products are available in a choice of five Microsoft Azure data centers in a different regions. Azure infrastructure meets a broad set of international compliance standards, including ISO 27001, SOC 1, and SOC 2, HIPAA, and country specific standards including Australia IRAP, UK G-Cloud.  You can choose to store and process your data in U.S.A. (US East), EU (Netherlands), Australia (Australia South East), U.K. (UK South) and Canada (Canada Central). All these JungleMail cloud instances are standalone, that means all file storage, databases, and backups are separated. 

Even though your data is not stored on our premises, we employ high security standards safeguarding our office premises or remote access. That includes monitored on-premises access, no wifi, VPN. 

Data Encryption and retention

All your data, including backups is encrypted at rest and traffic is encrypted in transit with TLS 1.2 only. 
The backups are encrypted and use geo-redundant and zone-redundant storage depending on Data center location to ensure compliance with data residency requirements.

Your data privacy

 All information uploaded to our servers remain yours.  We’ll never share, copy or modify your data. Only certain members of our team have authorization to access the servers with customers data. For more information, please review our Privacy Policy.

Application security

We perform regular automated vulnerability scanning, regulatory compliance checks using Azure Security Center tools. Manual penetration tests by third-party take place annually and all reported issues are addressed.

Download the full list of EnovaPoint’s Security Controls

Quality and Information Security

We strive to build long-term value, based on customer feedback while maintaining integrity and Information Security. Find out more on our Quality and Information Security policy page.

Certificates and Reports

ISO 9001:2015 Quality Management System

See certificate

ISO/IEC 27001:2013 Information Security Management System

See certificate

SOC loog

SOC 2 Type II

Learn more

SOC loog


See report