Statement on Security

Rest assured that Rizzoma uses advanced security technology to maximize the safety and security of your company information. Rizzoma implements strict security controls aimed at protecting each user, application and system, with the confidentiality and the integrity of your data as top priorities.

Rizzoma's policies and procedures on the collection, use and disclosure of your data are declared in Privacy Policy.

Secure Connections

All connections to Rizzoma are secured via Transport Layer Security (TLS). Any attempt to connect over HTTP is redirected to HTTPS.

Application Security

Rizzoma utilizes secure development best practices that integrate security reviews throughout design, prototype, and deployment. We implement firewalls and access restrictions on our servers to secure our network and better protect your information.

Customer Data Protection

All data is classified as confidential, unless declared public by topic members, and treated as such. Inbound and outbound low-level logical firewalls ensure that data cannot be leaked between Rizzoma networks. Sensitive production data is never migrated or used outside of the production network.

Hardened Operating System

Rizzoma runs on hardened Linux servers.

Data Center Security

Our servers are located in Amazon Cloud with high-end level of security at the physical level. Amazon Cloud is used by a wide range of leading companies including Dropbox, Reddit, and Pinterest.

Internal and Third Party Testing

Rizzoma routinely runs internal and external vulnerability scans and penetration tests.

Business Continuity

Your data is backed up multiple times a day and can be restored in emergency case by request.


Using OAuth you thus repose trust on reliable Google and Facebook authentication mechanisms. In case of using login-password authentication we store your passwords hard-encrypted, that is to say, hashed and salted with a salt unique for every password.

Security and privacy features available in Rizzoma

In a Rizzoma workspace, customers determine who can access topics and can instantly modify access to topics for participants if former have corresponding privileges.

Follow us: Blog