Start your security review
Search items
Overview
Security is in our DNA and embedded in our people, processes, and technologies. We apply hundreds of security processes and controls to help us comply with industry-accepted standards, regulations, and certifications. Security is built into the fabric of our cloud product, infrastructure, and processes, so you can rest assured that your data is safeguarded.
Compliance
GDPR
ISO 27001
ISO 27001 SoA
ISO 27701
SOC 2
Start your security review
Documents
Pentest Report
SOC 2 Report
Vulnerability Assessment Report
ISO 27001
ISO 27001 SoA
ISO 27701
SOC 2
Cyber Insurance
BC/DR
Penetration Testing
Business Continuity Policy
Data Security Policy
General Incident Response Policy
Information Security Policy
Other Policies
Software Development Lifecycle
Risk Profile
Data Access LevelRestricted
Impact LevelLow
Recovery Time Objective72 hours
View more
Product Security
Audit Logging
Data Security
Multi-Factor Authentication
View more
Reports
Pentest Report
SOC 2 Report
Vulnerability Assessment Report
Data Security
Access Monitoring
Backups Enabled
Data Erasure
View more
App Security
Code Analysis
Secure Development Training
Software Development Lifecycle
View more
Legal
Data Privacy
Cookies
Data Privacy Officer
Employee Privacy Training
Access Control
Data Access
Logging
Password Security
Infrastructure
Amazon Web Services
BC/DR
Infrastructure Security
Endpoint Security
Endpoint Detection & Response
Threat Detection
Corporate Security
Asset Management Practices
Email Protection
Employee Training
View more
Policies
Business Continuity Policy
Data Security Policy
General Incident Response Policy
View more
Security Grades
SecurityScorecard
Greenomy WebApp
Qualys SSL Labs
Greenomy WebApp