Overview
Everflow's security features help protect your business data while keeping work efficient.
Security Management Tools
API Key Controls
View Your API Keys
See all your network's API keys, including:
- Names and permissions
- Who uses each key
- Usage data
- When keys were created or changed

Create New Keys
- Keys are stored in hashed format
- Cannot be retrieved later
- Not accessible by Everflow staff
Managing Existing Keys
IP Whitelist Protection
A common strategy for mitigating fraudulent or other unwelcome activity on your offers is by limiting the API addresses you'll accept calls from.
API Whitelists allow you to block API calls from unknown IP addresses, and only allow calls from those IPs that you specify.

Managing Whitelists
Login Monitoring
Access History
Track platform access, including:
- When people log in
- Which devices they use
- Where they connect from
- Browser information

Customizing Views
- Use date range filters
- Filter by Employee
- Customize column display
- Search specific users
Multi-Factor Authentication (MFA)
Add extra login security using:
- Google Authenticator
- SMS verification
- Or both methods

Implementation
Quick Security Tasks
Best Practices
Maintaining robust security within your Everflow platform requires consistent attention to a few key areas.
Establish a regular schedule for rotating your API keys - this simple practice significantly reduces the risk of unauthorized access through compromised credentials. While changing keys, take the opportunity to review which applications and integrations truly need access, removing any that are no longer necessary.
Make login history review part of your regular security routine. By examining this data periodically, you can quickly identify unusual access patterns or suspicious activities before they become serious security issues.
Implementing Multi-Factor Authentication for all users creates an essential additional security layer that protects your account even if passwords become compromised. Complete your security strategy with monthly reviews of your IP whitelist configuration - as your business relationships and technical infrastructure evolve, so should your access controls.
These proactive security measures, when implemented consistently, create a strong defense system that protects your valuable marketing data while maintaining operational efficiency.