Upland’s cloud technology gives you freedom from legacy applications without having to compromise security or scalability.

  • Deploy in a team of 10 or 10,000

    Our applications are scalable and are able to support large deployments while maintaining required performance levels.

  • Be up and running in a matter of hours, not months

    Upland’s state of the art cloud applications free you from painful on-site deployment processes.

  • Access with confidence

    We provide tools to help our customers manage the critical elements of application security, including authentication, authorization and regulatory compliance. 

Supported by Upland’s Cloud Infrastructure

Real-time global monitoring

In-house cloud operations in ten locations world-wide

4 Secure Data Centers

Tier 4 data centers with patented multi-level security systems

Our Commitment to Security

Controlling Access and Security 

  • 24/7 on-site security personnel as well as video surveillance throughout facility and perimeter
  • Two-factor access control including biometric and man traps
  • Concrete data center walls with reinforced steel entry doors
  • Computing equipment in access-controlled steel cages
  • Building engineered for local seismic, storm, and flood risks to meet industry standards
  • Asset tracking

Environmental Controls

  • Humidity and temperature control
  • Redundant (N+1) cooling system

Redundant Power Sources

  • Underground utility power feed
  • Redundant utility power providers
  • Redundant (N+1) CPS/UPS systems
  • Redundant power distribution units (PDUs)
  • Redundant (N+2) diesel generators with on-site diesel fuel storage

Secure and Reliable Network

  • Concrete vaults for fiber entry
  • Redundant internal networks
  • Network neutral; connects to all major carriers and located near major Internet hubs
  • High bandwidth capacity
  • Perimeter firewalls and edge routers block unused protocols
  • A third-party service provider continuously scans the network externally and alerts changes in baseline configuration

Fire Detection and Suppression

  • VESDA (very early smoke detection apparatus)
  • Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression

Secure Transmission and Sessions

  • Connection to the Upland Software environment is via SSL to create a secure connection from a user’s browser to our service
  • Individual user sessions are identified and re-verified with each transaction, using a unique token created at login

Disaster Recovery and Backups

  • The service performs real-time replication to disk at each data center, and near real-time data replication between the production data center and the disaster recovery center
  • Data are transmitted across encrypted links
  • Disaster recovery tests verify our projected recovery times and the integrity of the customer data
  • All data is backed up to disk, on a rotating schedule of incremental and full backups
  • Backups are cloned over secure links to a secure archive

Internal and Third-Party Testing and Assessments

Upland Software tests all code for security vulnerabilities before release, and regularly scans our network and systems for vulnerabilities. The following third-party assessments are also completed regularly:

  • Application vulnerability threat assessments
  • Network vulnerability threat assessments
  • Selected penetration testing and code review
  • Security control framework review and testing