MeshMesh

Security

Learn about MeshMesh's security measures, data protection, and compliance features

Security & Privacy

MeshMesh is built with security and privacy as foundational principles. Your Salesforce data never leaves the secure connection between MeshMesh and Salesforce.

We use bank-level encryption and industry-leading security practices across all Salesforce products including Marketing Cloud Engagement, Sales Cloud, Service Cloud, and Data Cloud.

Security Architecture

Core Security Features

End-to-end encryption for all data

  • AES-256 encryption for stored credentials
  • TLS 1.3 for all API communications
  • Encrypted database storage
  • Zero-knowledge architecture

Granular permissions and authentication

  • Role-based access control (RBAC)
  • Multi-factor authentication support
  • Session management and timeouts
  • API key rotation capabilities

Comprehensive logging and monitoring

  • Complete audit trails for all actions
  • Real-time security monitoring
  • Anomaly detection and alerting
  • Compliance reporting tools

Privacy-first approach to data

  • Minimal data retention policies
  • Right to data deletion
  • Privacy by design architecture
  • Anonymization capabilities

Data Handling Principles

Data Minimization

Only collect and process data necessary for service functionality

  • Purpose limitation for all data collection
  • Regular data audits and cleanup
  • Automatic data expiration policies
  • User control over data sharing

Transparency

Clear visibility into how your data is used

  • Detailed privacy policies
  • Real-time data usage dashboards
  • Clear consent mechanisms
  • Regular transparency reports

User Control

Full control over your data and usage

  • Granular privacy settings
  • Data export capabilities
  • Right to deletion
  • Consent withdrawal options

Security Best Practices

Threat Protection

Data Breaches

Protection: Multi-layered encryption and access controls

  • Zero-trust security architecture
  • Continuous security monitoring
  • Incident response procedures
  • Regular penetration testing

Unauthorized Access

Protection: Strong authentication and authorization

  • Multi-factor authentication
  • Role-based access control
  • Session monitoring
  • Anomaly detection

Data Loss

Protection: Comprehensive backup and recovery

  • Automated backup processes
  • Geographic data replication
  • Point-in-time recovery
  • Disaster recovery testing

Compliance

Protection: Built-in compliance frameworks

  • Automated compliance checking
  • Regular compliance audits
  • Policy enforcement engines
  • Compliance reporting tools

Incident Response

Detection

24/7 monitoring and automated alerts for potential security incidents

Assessment

Rapid impact analysis and classification of the incident severity

Containment

Immediate threat isolation and mitigation to prevent spread

Recovery

System restoration and notification to affected customers

Customer Communication:

  • Immediate notification for incidents affecting data
  • Regular updates throughout incident resolution
  • Post-incident reports with lessons learned
  • 72-hour breach notification for GDPR compliance

Security Resources

Need help with security questions or want to report a vulnerability?

Security Issues: [email protected] Privacy Questions: [email protected]

Responsible Disclosure

We encourage responsible disclosure of security vulnerabilities. Our security team is available 24/7 to respond to critical security incidents.