ProtonBlog(new window)

Proton Mail’s world-class reliability is now backed by a 99.95% service level agreement (SLA)

Since we first opened to the public in 2014, Proton Mail has grown at an accelerating pace and is now the largest secure email provider in the world. With so many organizations depending on us for everyday communications, we are proud to offer an uptime guarantee for the services we provide. Our service level agreement (SLA) ensures that if downtime in any calendar month exceeds 0.05%, we will issue you a partial refund.

The new Proton Mail SLA is an expression of our confidence in our systems. We have exceeded 99.95% uptime for the past two years, and we continue to work hard and invest heavily in site reliability.

Site reliability engineering at Proton Mail

Proton Mail owns and controls its network, located inside four geographically diverse datacenters in Switzerland and Germany. Because of the high security needs of our users, we selected each datacenter according to high security and reliability standards (each datacenter is ISO 27001 certified). We implement several layers of redundancy, both within each datacenter and across our network. At the server level, our infrastructure is designed to automatically reroute traffic if any servers go offline. Redundancy in our servers allows us to add servers and take servers offline without downtime.

Proton Mail is a member of the Réseaux IP Européens Network Coordination Centre (RIPE NCC)(new window), providing us with our own dedicated allocation of IPv4 and IPv6 addresses, which allows us to control IP reputation and isolate our network infrastructure from other potential points of failure. You can read more details about our network and infrastructure here(new window).

Strong defenses against cyber attack

Our infrastructure also provides strong protections against cyber attacks that might seek to reduce our uptime. Proton Mail provides state-of-the-art protection(new window) against DDoS (distributed denial of service) attacks. Hosting your emails with Proton Mail means that if your business or website ever comes under DDoS attack (or if another business hosted at the same location comes under attack), your email will stay online and accessible, and you won’t lose your most important way of communicating with customers. This is important because DDoS is becoming one of the most popular ways to attack and disrupt businesses(new window).

Proton Mail also utilizes end-to-end encryption(new window) and zero-access encryption(new window) to ensure that even in the unlikely event of a data breach, the contents of your emails will stay secure.

Redundancy to prevent downtime and data loss

A high level of data redundancy means that Proton Mail is very resistant to data loss. Proton Mail’s three datacenters are geographically distributed across different regions of Switzerland. All data is replicated across multiple sites so we can suffer multiple catastrophic failures before experiencing actual data loss. Furthermore, our infrastructure is designed even to survive the loss of an entire datacenter due to natural or man-made disasters.

We also have a rigorous system of backups. Each data storage system has multiple backups, which can be enabled if there is ever a failure of the primary database. There are also secondary backups in case the first backup fails. Data loss is further prevented by automated and regular backups of all customer data.

Transparent and rapid customer communications

We strongly believe in providing transparent and timely information about any service outages. You can find real-time status information about Proton Mail and Proton VPN(new window) at protonstatus.com(new window), and we post updates and respond to questions on Twitter(new window), Facebook(new window), and Reddit(new window).

Our success is predicated on strong security and consistent uptime, and site reliability is one of our highest priorities. Our newly introduced SLA is a reflection of this focus and allows your organization to use Proton Mail with confidence. For more information, you can read the full details of our SLA in our Terms and Conditions(new window).

Best Regards,
The Proton Mail Team

Learn more about how Proton Mail can help secure your business communications(new window).

Proton Mail provides free encrypted email(new window) accounts to the public.

We also provide a free VPN service(new window) to protect your privacy.

Sichere deine E-Mails, schütze deine Privatsphäre
Proton Mail kostenlos holen

Verwandte Artikel

what is a brute force attack
en
  • Grundlagen der Privatsphäre
On the subject of cybersecurity, one term that often comes up is brute force attack. A brute force attack is any attack that doesn’t rely on finesse, but instead uses raw computing power to crack security or even the underlying encryption. In this a
en
Section 702 of the Foreign Intelligence Surveillance Act has become notorious as the legal justification allowing federal agencies like the NSA, CIA, and FBI to perform warrantless wiretaps, which sweep up the data of hundreds of thousands of US citi
en
In response to the growing number of data breaches, Proton Mail offers a feature to paid subscribers called Dark Web Monitoring. Our system checks if your credentials or other data have been leaked to illegal marketplaces and alerts you if so. Often
en
Your email address is your online identity, and you share it whenever you create a new account for an online service. While this offers convenience, it also leaves your identity exposed if hackers manage to breach the services you use. Data breaches
proton pass f-droid
en
Our mission at Proton is to help usher in an internet that protects your privacy by default, secures your data, and gives you the freedom of choice. Today we’re taking another step in this direction with the launch of our open source password manage
chrome password manager
en
You likely know you should store and manage your passwords safely. However, even if you are using a password manager, there’s a chance the one you’re using isn’t as secure as it could be. In this article we go over the threats some password managers