Q: Where is my data located?
The geographic location of Jodoo's current data server is Singapore.
Our database data is stored in two locations: AWS and Mongo Atlas. AWS guarantees network and infrastructure security, host and endpoint security, data protection and encryption, compliance, risk and compliance (software/hardware), log recording, monitoring, SIEM, threat detection and analysis, identity and access control, vulnerability and configuration analysis, application security, and security engineering.
Q: Tell me more, like how does the firewall work? And how do you prevent DDoS attacks or other attacks?
Our data infrastructure is deployed on AWS. Relying on AWS's powerful security service, Jodoo employs a multi-layered security strategy to protect user data. The following is an overview of our deployment strategy.
Firewall Security Strategy
Use AWS security groups to restrict traffic entering and leaving the service.
Use AWS WAF's Web ACL to protect the service from common web attacks.
Use AWS Shield to automatically protect against DDoS attacks, network attacks, and other types of attacks.
Elastic Scaling Strategy
Use AWS Auto Scaling to ensure high availability of the application.
Adopt a distributed architecture to improve system stability by limiting the stress on individual nodes.
Use AWS CloudWatch to monitor the health of the service and respond to issues promptly.
Encryption Strategy
Use HTTPS protocol to protect user data.
Use AWS KMS to manage key management and ensure data security.
Q: Is file storage also hosted on AWS? Or, besides AWS, any other storage provider?
File storage is hosted using AWS's object storage feature, and it is completely stored on AWS without any other vendors.
Q: How is the backup done? What is the lead time for backups? And where is the backup storage?
Backups are performed using Mongo Ops Manager, with a backup schedule set for daily backups. Backups are stored in an AWS object storage repository.
Q: How can I check if my network is currently in good condition?
Network problems often affect our efficiency when previewing, downloading, and uploading data. Through Network Self–service Test | Jodoo, you can monitor the current network status. If the network status is good while the problem of slow data loading keeps occurring, you may contact technical support to check the problem details.
Q: Can fields/data/forms/dashboards/applications be restored after being deleted?
Yes, for details, refer to the following table for specific recovery rules:
Content | Plan | Retention Days | Recovery Method |
Field | Business | 45 | For details, see Field Recycle Bin. |
Data | Business | 45 | For details, see Data Recycle Bin. |
Data | Enterprise | 180 | For details, see Data Recycle Bin. |
Form | All plans | 30 | For details about deleting or restoring a form, see Designing a Form. |
Dashboard | All plans | 30 | For details about deleting or restoring a dashboard, see Dashboard. |
App | All plans | 30 | For details about deleting and recovering apps, see App Management. |
Q: Is Jodoo GDPR compliant?
Yes, we have implemented technical and security processes to ensure it is handled responsibly and securely. Learn more about our approach to GDPR here.
Q: How can I view Jodoo’s Vanta Trust Report?
We partner with Vanta to continuously monitor our security posture and compliance. You can access our latest Vanta Trust Report here.
Q: Can I enforce user-level permissions in Jodoo apps?
Yes. Jodoo allows you to assign permissions and group memberships to control who can access specific features and data. This ensures that only the right people see the right information.
Q: Is Jodoo ISO 27001 certified?
Yes, Jodoo is ISO 27001 certified. You can learn more about our certificate here: