leadstrive logo lightleadstrive logo dark
  • Home
  • About
  • Features
    Workflow AutomationTrigger off any event, branch on any condition, run any action.AI AssistantAn AI teammate that handles the back-and-forth.
  • Industries
    Insurance AgenciesCapture quotes, route producers, automate renewals.Real EstateRealtors, wholesalers, and investors who close more.Home ServiceHVAC, plumbing, roofing, electrical, cleaning.Mortgage TeamsLoan officers and brokers who win the rate-shopper.
  • Contact
LoginSee demo
  • Home
  • About
  • Features
    • Workflow Automation
    • AI Assistant
  • Industries
    • Insurance Agencies
    • Real Estate
    • Home Service
    • Mortgage Teams
  • Contact
  • Login
leadstrive logo dark

The all-in-one growth system that turns leads into booked clients — automatically.

Solutions

  • Reviews
  • Messaging
  • Automation
  • Pipelines

Company

  • About
  • Industries
  • Contact
  • Support
  • Demo

Get in touch

  • (281) 584-6444
  • connect@leadstrive.com
  • Monday - Friday
    9:00 AM - 5:00 PM
LeadStrive

© 2026 LeadStrive. All Rights Reserved.

Privacy PolicyTerms of ServiceUsage PricingSecurity

Security

LeadStrive Security Controls — last updated May 2025

In order to protect the data that is entrusted to us, LeadStrive utilizes layers of administrative, technical, and physical security controls throughout our organization. This page describes those controls in plain language.

Infrastructure security

Cloud hosting

LeadStrive uses Google Cloud Platform Services and AWS for hosting. Google provides a monthly uptime percentage to customers of at least 99.5%, and AWS guarantees between 99.95% and 100% service reliability. All infrastructure resides in the United States.

Network and perimeter

Multiple filtering layers protect our web applications. Logical firewalls and security groups are implemented across the environment. By default, firewalls are configured to deny network connections that are not explicitly authorized, and firewall rulesets are reviewed on a recurring schedule.

Configuration management

Our infrastructure environment is automated. Server configurations are embedded in images and configuration files. In the event that a production server deviates or drifts from the baseline configuration, it will be overwritten with the baseline within 30 minutes.

Logging

Actions and events are comprehensively logged through a central cloud logging solution, with controlled write access to the storage service.

Alerting and monitoring

Automated monitoring and alerting detect anomalies in error rates, abuse, and application attacks. Automatic responses include traffic throttling and process termination.

Application security

Web application defenses

We use firewall and application security protections aligned with OWASP Top 10 guidelines. DDoS attack protections are included.

Development and release management

We use a continuous delivery approach. Code reviews and testing run before any deployment. Static code analysis runs regularly against code repositories. Dynamic security vulnerability testing is performed periodically. Our QA environment is separate from production. Deployments are automated with a rollback capability, and SaaS updates roll out with no downtime.

Vulnerability management

A multi-layered vulnerability management program runs regular scans with adaptive tooling, plus annual penetration tests. Mitigation is prioritized by risk.

Customer data protection

Data classification

Per our Terms of Service, customers are responsible for appropriate data collection. The following types of data are prohibited on the platform:

  • Credit or debit card numbers
  • Financial account information
  • Social Security numbers
  • Passport numbers
  • Financial or health information (except as expressly permitted)

Tenant separation

LeadStrive is a multi-tenant SaaS with logical separation enforced by unique tenant identifiers. Authorization rules sit in the design architecture and are continuously validated. Authentication, availability, and user access are logged.

Encryption

All data is encrypted in transit with TLS version 1.2 or 1.3 and 2,048-bit keys or better. Platform data is stored using AES-256 encryption. Passwords are hashed and encrypted following industry best practices.

Key management

TLS private keys are managed through our content delivery partner. Volume and field-level encryption keys live in a hardened KMS and are rotated based on data sensitivity. TLS certificates are renewed annually. Customer-supplied encryption keys are not currently supported.

Data backup and disaster recovery

System reliability and recovery

Redundancy is built into all services. Server infrastructure is strategically distributed across multiple availability zones, with point-in-time recovery for web, application, and database components.

Backup strategy

Regular backups are taken on a documented schedule. Seven days of backups are kept for any database, with daily backups to the local region. Backup execution and replication failures are monitored with alerting. Backup storage uses public cloud services rather than physical media. Access controls, Write Once Read Many (WORM) protections, and file system access control lists guard backup integrity.

Customer data restoration

LeadStrive manages disaster recovery operations. A recycle bin restores deleted records — contacts, opportunities, custom fields, tags, notes, and tasks — for up to 30 days. Version history is available for web pages, blog posts, and emails. Export tools and public APIs are available for ongoing data sync.

Identity and access control

Product user management

Customers create and manage their own users, assign privileges with granular authorization rules, and limit access at any time.

Product login protections

Native LeadStrive login is available with a uniform password policy that requires a minimum of 8 characters and a combination of upper and lower case letters, special characters, and numbers. Two-factor authentication is available, and portal administrators can require 2FA for all users.

Compliance

LeadStrive does not store, process, or collect credit card information and is not PCI-DSS compliant. Card transactions are handled by PCI-compliant payment processors. Additional details on sensitive-data processing are in our Terms of Service and Privacy Policy.

Privacy

We do not sell your personal data to third parties. Customer data is retained while your account is active. Written deletion requests are honored as required by privacy regulations. Logs and metadata may be retained for security, compliance, and statutory needs. Custom retention policies are not currently available.

Breach response

LeadStrive will notify customers as required by law if we become aware of a data breach that impacts your personal data.

GDPR

LeadStrive aims to provide features that enable our customers to easily achieve and maintain their GDPR compliance requirements.

Document scope and use

This document is intended to be a resource for our customers. It is not intended to create a binding or contractual obligation between LeadStrive and any parties, or to amend, alter, or revise any existing agreements between the parties. LeadStrive is continuously improving the protections we have implemented, so our procedures may be subject to change.