Time to innovate
One of the fruits of being self-funded is the time for extreme innovation. Over the years, we've developed extensive proprietary technology to support the complex needs of our clients. In fact, all of our products today are built on a unique isomorphic paradigm in which much of an application's logic can be run directly in the web browser, enabling even the most computationally intense operations to be performed at blazing fast speeds.
Products
-
Simple, ad-free volunteer signups to quickly organize volunteers for any need.
Learn more -
Ministry scheduling software to help churches schedule, connect and grow their ministries.
Learn more
Security
Protecting customer data is fundamental to how we build and operate our products. At Rotunda Software, we use a layered approach to safeguard information across our platform—from infrastructure and data handling to continuous monitoring—so you can trust that your information is secure.
Infrastructure Security
Our platform is hosted on Amazon Web Services (AWS), a leading cloud provider known for its secure and highly available infrastructure. We follow industry best practices to maintain a strong security posture, including:
- System hardening and secure configuration
- Regular patching and updates
- Continuous monitoring and operational review
This foundation allows us to deliver a reliable and secure experience at scale.
Data Protection
All data transmitted between your device and our systems is encrypted using modern Transport Layer Security (TLS), helping protect sensitive information from interception. We also limit access to customer data to only what is necessary to operate and support the service, and apply safeguards to protect that data throughout its lifecycle.
Payments & PCI Compliance
We follow PCI-DSS aligned practices to support secure payment processing. Payments are handled by Authorize.net, a trusted third-party payment provider. Rotunda Software does not store full credit card numbers or card security codes on our servers.
We also perform regular external vulnerability scans to help validate the security of our public-facing systems.
Security Testing & Monitoring
Security is not a one-time effort—it's an ongoing process. We regularly:
- Conduct security testing, including penetration testing
- Monitor systems for potential vulnerabilities
- Review and improve our applications and infrastructure
We stay current with evolving security best practices so we can respond quickly to new and emerging threats.
Ongoing Commitment
We continuously invest in improving our security practices to protect our customers and their communities. As our platform evolves, so does our approach to safeguarding your data.