Security & Trust¶
Slide is a security-first business continuity partner for MSPs. Our customers trust us because our controls, internal culture, and decades of expertise ensure their data and operations are protected without compromise.
Our commitments to security and availability reflect the standards we hold ourselves to in designing and operating our platform. These commitments are not limited to legal or contractual terms; they are embedded in our engineering philosophy, reinforced by our internal controls, and demonstrated through the transparency of our Trust Center, release notes, and status page.
Decades of Domain Expertise¶
Our leadership and engineering teams bring together decades of combined experience in security, disaster recovery, and managed services. This background is the foundation of our approach: we think of ourselves first as a security company, and then as a backup company. Our mission is to deliver modern, resilient business continuity and disaster recovery (BCDR) solutions to MSPs with uncompromising trust.
Security-First Design Philosophy¶
Our products are built from the ground up with security as the first principle. We employ a least-privilege model, ensuring access is granted only when absolutely necessary and tightly aligned with business needs. This mindset influences every design decision from data architecture to user authentication, making security intrinsic, not an afterthought.
Data Protection by Default¶
We treat customer data with the highest level of protection:
- AES-256 encryption at rest and in transit on both local appliances deployed at client sites and within the Slide Cloud.
- ZFS native encryption leveraging a mature, secure file system framework with copy-on-write and end-to-end checksumming to ensure durability, immutability through snapshots, and strong protection of backup data.
- MSP-controlled encryption passphrases, empowering our partners to take ownership of client data security directly within their workflow. This option reinforces trust and alignment with high security requirements.
- Secure delayed delete, a safeguard that ensures backups cannot be immediately or permanently deleted, giving MSPs and their clients an additional layer of protection against accidental or malicious data loss.
Proven Product Security¶
We employ multiple layers of product testing and validation to safeguard customer data:
- Automated code analysis to detect vulnerabilities early.
- Third-party penetration testing with leading security experts.
- Continuous vulnerability scanning across our software supply chain, infrastructure, and applications.
Together, these practices ensure we stay ahead of evolving threats.
Enterprise-Grade Security Practices¶
We apply the same security rigor internally that we deliver externally:
- Centrally managed and monitored employee devices with full disk encryption and endpoint protection.
- Secure remote access via WireGuard, a modern VPN platform.
- Strong identity and access management to enforce the principle of least privilege.
We embed defense-in-depth across people, processes, and technology.
Strong Internal Controls for a Security-Minded Team¶
Even as a growing company, we hold ourselves to enterprise-grade standards. Our internal controls are structured to ensure:
- Rigorous monitoring of policies and compliance.
- Mandatory onboarding and ongoing security training for all employees.
- Regular reinforcement of access management best practices.
This creates a culture of accountability where every employee is a security stakeholder.
Reliable Availability & Resilience¶
We recognize that business continuity requires not just secure data, but data that is always accessible. Slide’s architecture and operational practices are designed to support availability by:
- Providing resilient infrastructure and redundant storage mechanisms.
- Maintaining disaster recovery and incident response plans with defined recovery objectives.
- Communicating transparently about performance through our real-time status page.
Commitment to Continuous Compliance¶
We are actively pursuing SOC 2 Type 1 compliance, and are committed to following with SOC 2 Type 2, HIPAA, and more in the future. To ensure rigor and transparency, we’ve partnered with A-Lign as our auditor and Vanta to drive our continuous GRC efforts, allowing us to monitor, validate, and improve our controls in real time.
We encourage partners to visit our Trust Center to stay updated on our progress and learn more about the security and availability measures already in place.