Securing and Protecting Your Data

Sleep easy knowing your backups are protected by enterprise grade systems and processes.

Person working at standing desk

Our Philosophy

Protection of customer data is a top priority which merits continuous investment in our security systems and processes.

  • Keep customer data safe and secure.
  • Keep the system easy to use for customers.
  • Proactively monitor all systems and processes.
  • Hire third-party organizations to continuously test the security of our systems and processes.
  • Provide our Chief Information Security Officer the resources needed to enable this security philosophy.
shield behind person on couch with laptop

Account Access

Deploy the best-in-class security to prevent unauthorized use or access.

Data Transmission & Storage

Data is encrypted on your computer, encrypted during transmission, and encrypted while stored.

  • Personal Encryption Key (PEK): PEK option available for all users. With a PEK, Backblaze cannot access your data (in case of lost password, subpoena, or any other event).
  • Data Transferred via HTTPS: Using a strong protocol, a strong key exchange, and a strong cipher. We continuously monitor using industry standard, independent sources like SSL Labs.
  • Public/Private Keys: 2048-bit public/private keys secure a symmetric AES-128 key.
Business Security Transmission Diagram

B2 Cloud Storage

B2 is our object storage service. It allows you to determine the level of security that is right for you and your data.

  • SLA of 99.9% availability.
  • Durable by design—you can trust that your data is safe with us.
  • Backblaze B2 stores the data you put in it. Choose to upload only encrypted data, use a third-party integration to encrypt data before transmission to Backblaze B2, or store data unencrypted.
  • Data is immediately encoded for redundancy upon receipt and stored in a data center in your account region.
  • Data in private Buckets can only be accessed after account authentication.
  • Data in Backblaze B2 can be protected from ransomware using Object Lock and third-party integrations, making the data non-erasable and non-modifiable for a user-specified interval.
Person working on computer

Storage Infrastructure & Data Durability

Our purpose built infrastructure—based on the Backblaze Storage Pod—is designed from the ground up to keep your data safe and secure. Backblaze Vaults and Backblaze Reed-Solomon encoding create a durable-by-design system so you can trust that your data is safe.

an old Backblaze storage pod

An early photo of the Backblaze Storage Pod.

Data Centers

Our physical facilities have best-in-class security features and are staffed every hour of every day of the year.

  • SSAE-18/SOC-2 compliant.
  • Biometric security.
  • ID checks and area locks that require badge-level access.
  • Regions: U.S. West (California & Arizona), U.S. East (Virginia), & EU Central (Amsterdam).
Business Security Data Center Photo

Ready to Get Started?

Start protecting your business or organization today with a free trial.

Start Now

Have More Questions?

Get in touch with our Business Account team. We are here to help.
Are you an IT consultant, reseller, or MSP?