Fortifying Your Data
for a Secure Tomorrow

Safeguarding Information with Advanced Data Security Measures

Security and Compliance

Corrz Technosolutions (hereby referred to as “Rezo” or “We”) services and bots are designed with security in mind. Clear procedures and automated controls ensure your data remains protected while you stay in control. Through our advanced AI-platform, we strive to create a seamless and delightful experience for customers, employees, and agents alike.

Security and Privacy are of utmost importance and are given the highest priority at Rezo. We are committed to protect the confidentiality, integrity, availability, and privacy of our information systems and customer’s data through the implementation of numerous controls.

Infrastructure Security

Cloud Security and Data Storage

Rezo platform is powered by Azure, Google Cloud Platform (GCP) and Amazon Web Services (AWS), for hosting and computing activities. Azure, GCP and AWS,  maintains and demonstrates tons of compliance programs which are but not limited to SSAE-16 SOC 1, 2, and 3, ISO 27001, etc.

Rezo has segregated the production environment from the non-production environment both physically and logically to maintain the confidentiality, integrity, availability (CIA), and privacy of customer’s data. Our Cloud Infrastructure provides the computing power necessary to handle the exponential increase in customer interactions and enables seamless integrations with third-party services.


All data stored in the Service is encrypted both in transit and at rest. Database instances, including read replicas and backups, are encrypted using the industry standard AES-256 encryption algorithm. Encryption is enforced via TLS to all data in transit.

Business Continuity and Disaster Recovery

Automated full-time backups are taken of the databases to mitigate the risk of losing customer data due to disk corruption. Periodic backup and restoration tests are performed to ensure easy and timely recovery of data. Disaster Recovery sites are set up to ensure minimal loss and support business continuity. Annual disaster recovery drills are conducted to ensure Rezo can respond to disasters and emergencies that affect the information systems. Such drills help minimize the risk of a security mishap on business operations.

Access Control

Stringent access management controls are in place to grant authorized users the right to use a service while restricting access to unauthorized users. Rezo has implemented security policies across all systems (including APIs), platforms, applications, and devices to identify security violations, remove unauthorized access privileges, and revoke access if necessary. Role-based access controls and least privilege access controls are in place.

Vulnerability Assessment and Penetration Testing (VAPT)

Rezo conducts rigorous periodic VAPT inhouse and with leading independent security consulting firms to obtain a detailed view of the threats that might impact the security and privacy framework of Rezo’s platform and various applications. It helps Rezo to protect data and systems from malicious attacks, which may lead to any kind of data loss and unauthorized access to the systems.

Data Privacy and Confidentiality

Protecting the privacy of our customers is our highest priority. Rezo’s product is designed with privacy as a priority. Rezo collects and processes PII data within the limits of the law and for business use cases agreed with the customers. All PII data is deleted once the purpose is fulfilled. We are ISO 27701:2019 certified and General Data Protection Regulation (GDPR) compliant organization. For further details, please refer to our privacy policy.

Trust and Compliance

Rezo focus has always been on a customer’s right to privacy and security. We strictly adhere to all industrial & global security compliance standards.