Recust only allows client requests using robust TLS protocols and ciphers. All client communication with Recust utilizes cryptographically hashed headers and timestamps to verify authenticity. It's the same protocol used by Citi, Chase, Bank of America, Wells Fargo, Stripe, Amazon, Google, and other institutions.
Separate access controls are enforced at each layer of infrastructure. Multi-factor authentication is required for access to Recust photography software infrastructure. All application and user access logs are stored centrally and monitored.
Recust regularly undergoes both internal and external network penetration tests and third-party code reviews. Recust has also completed a SOC 2 report. If you have any questions, please email us at email@example.com
We use the AWS API that only allows client requests using strong TLS protocols and ciphers. Communication between our infrastructure and third parties is transmitted over encrypted tunnels. All client communication with AWS API utilizes cryptographically hashed headers and timestamps to verify authenticity.
If you think that you have found a security issue, please contact us at firstname.lastname@example.org We take all reports seriously. Please do not publicly disclose the issue until we’ve addressed it.
To start work with Recust create your contact list and link your all photos, projects, documents and sales with the Recust photography sales software and CRM for photographers.