Recust only allows client requests using robust TLS protocols and ciphers. All client communicationwith Recust utilizes cryptographically hashed headers and timestamps to verify authenticity. It's thesame protocol used by Citi, Chase, Bank of America, Wells Fargo, Stripe, Amazon, Google, and otherinstitutions.
Separate access controls are enforced at each layer of infrastructure. Multi-factor authentication isrequired for access to Recust photography software infrastructure. All application and user accesslogs are stored centrally and monitored.
Recust regularly undergoes both internal and external network penetration tests and third-party codereviews. Recust has also completed a SOC 2 report. If you have any questions, please email us email@example.com
We use the AWS API that only allows client requests using strong TLS protocols and ciphers.Communication between our infrastructure and third parties is transmitted over encrypted tunnels.All client communication with AWS API utilizes cryptographically hashed headers and timestamps toverify authenticity.
If you think that you have found a security issue, please contact us at firstname.lastname@example.org We take allreports seriously. Please do not publicly disclose the issue until we’ve addressed it.
To start work with Recust create your contact list and link your all photos, projects, documents andsales with the Recust photography sales software and CRM for photographers.