
Email SecurityĮvernote gives you a way to create notes in your account by sending emails to a unique Evernote email address. All users can generate codes locally using an application on their mobile device or can choose to have the codes delivered as a text message. Our 2SV mechanism is based on a time-based one-time password algorithm (TOTP). We limit failed login attempts on both a per-account and per-IP-address basis to slow down password guessing attacks.Įvernote offers two-step verification (“2SV”), also known as two-factor or multi-factor authentication, for all accounts. While we don’t require you to set a complex password, our password strength meter will encourage you to choose a strong one. We select the number of hashing iterations in a way that strikes a balance between user experience and password cracking complexity. When we need to securely store your account password to authenticate you, we use PBKDF2 (Password Based Key Derivation Function 2) with a unique salt for each credential. Account SecurityĮvernote never stores your password in plaintext. We limit who has access to our production infrastructure based on business need and strongly authenticate that access. We use these to control which services we expose to the Internet and to segment our production network from the rest of our computing infrastructure. Network SecurityĮvernote defines its network boundaries using a combination of load balancers, firewalls, and VPNs. Our security team continually evaluates new tools to increase the coverage and depth of these assessments. We periodically assess our infrastructure and applications for vulnerabilities and remediate those that could impact the security of customer data. Our IR team has procedures and tools in place to respond to security issues and continues to evaluate new technologies to improve our ability to detect attacks against our infrastructure, service, and employees.

The security team runs an in-house Incident Response (“IR”) program and provides guidance to Evernote employees on how to report suspicious activity. We drive a security program that includes the following focus areas: product security, infrastructure controls (physical and logical), policies, employee awareness, intrusion detection, and assessment activities. Our security team's charter is protecting the data you store in our service.

Security is a dedicated team within Evernote. We will continue to expand and update this information as we add new security capabilities and make security improvements to our products.

The information on this page is intended to provide transparency about how we protect that data. That trust is based upon us keeping that data both private and secure. Evernote users trust us with billions of their notes, projects, and ideas.
