Asset Intelligence and Management

Data Management You Can Trust

We’ve implemented industry best practices to ensure your data is always in safe hands

Security Update

What is the Log4j vulnerability (CVE-2021-44228) ?
Log4shell (CVE-2021-44228) is a critical vulnerability identified in the Apache Log4j Java library on Thursday, December 9, 2021. A widely used logging tool, Log4j is used to collect information across thousands of apps and services on the internet. This vulnerability allows attackers to execute code remotely and target computer systems exposing them to data theft and malware.
Is EZRentOut affected by Log4shell?
EZRentOut does not use Log4j. We have fully investigated our technology stack and can confirm that EZRentOut is not impacted. We will continue to monitor potential security vulnerabilities to proactively mitigate risk if identified.

SOC 2 Compliance

EZRentOut is Service Organization Controls (SOC) 2 compliant. EZRentOut has been audited on the Trust Services Principles and Criteria (TSP) of the American Institute of Chartered Public Accountants (AICPA). The AICPA SOC 2 Type 2 report gives assurance with regards to the security, availability, processing integrity, confidentiality, and privacy of information and data systems directly owned, managed and controlled by EZRentOut. Additionally, SOC 2 compliance ensures transparency and provides a level of trust to our customers on security controls implemented to safeguard customer data on all control environments pertaining to retrieval, storage, processing, and transfer of data. To request EZRentOut’s SOC 2 Type 2 report, please reach out to

ISO 27001 Certification

EZRentOut is certified by Resource Inspection Canada Incorporated (RICI) for ISO/IEC 27001 compliance. RICI is a Certification Body associated with the International Accreditation Service (IAS) in the US and is geared towards exceeding customer satisfaction in the fields of ISO Management Training, Auditing, Inspections, Testing, and Certification. The ISO/IEC 27001 is one of the most widely acknowledged information security standards worldwide, outlining best practices to secure the confidentiality, integrity, and availability of information in a company. ISO/IEC 27001 outlines and provides the requirements for an information security management system (ISMS), specifies a set of best industry practices, and details the security controls that can help manage information risks. As an ISO 27001 certified company, EZRentOut is able to easily detect, monitor, and eliminate any potential information security risks - particularly as they relate to rental management, access control, and classification policies.

GDPR Compliant

With our GDPR compliance in place, EZRentOut’s European customers can have added trust in the privacy of the data made available to us. Additionally, customers themselves can adhere to impregnable data protection standards just by using us to track their inventory and rental assets. This means that EZRentOut is not only GDPR compliant itself, but also enables its customers (as Data Controllers) to become GDPR compliant. This is the result of our new functionality relating to data security and consent. For more information, read our blog on GDPR Compliance.

GDPR Compliant

Hosted on Amazon Web Services
EZRentOut hosts all its data on Amazon Web Services (AWS). The AWS is ranked as one of the world’s best cloud computing services and stores information of some of the largest global enterprises. To this end, it has robust controls in place to ensure security and data protection in the cloud. The AWS IT infrastructure is therefore developed and managed in agreement with security best practices and a variety of IT security standards. For an overview of the security processes in place at AWS, read their Security Whitepaper.

Additional Security Measures

EZRentOut continues to make data security a priority. Here are some of our additional security measures:

  • All the data we process is encrypted using the AES-256 encryption specification.
  • We execute penetration testing every six months to detect potential security vulnerabilities.
  • Our internal and external integrations rely heavily on authentication/authorization protocols.
  • Our Enterprise Private Cloud option ensures your enterprise’s data is kept on a separate server instance.

Have Questions?

Reach out to us at

Ready to Get Started?

Powerful rental management, at your fingertips.