Syncari was designed to be secure from the beginning. Our security capabilities are core to our platform so you can focus on maximizing the value of your data, not locking it down.
SECURE BY DESIGN
Syncari is committed to the security of our customers and their data.
Syncari’s products and services are regularly and independently verified against industry-leading compliance, privacy, and security standards to help support your organization’s compliance needs. Syncari supports Privacy Shield, SCCs, CCPA and GDPR compliance. Additionally, Syncari is HIPAA compliant and can provide HIPAA Business Partner Agreements and complies with GLBA practices for securing infrastructure and applications. Our SOC 2 Type II and HIPAA certifications are audited annually.
Syncari customers own their data. The data that customers put into our systems is theirs, and we do not scan it for advertisements nor sell it to third parties. We offer our customers a detailed data processing amendment that describes our commitment to protecting customer data. To keep data private and secure, Syncari logically isolates each customer’s data from that of other customers and users, even when it’s stored on the same physical server.
Syncari administrates a vulnerability management process that actively scans for security threats using a combination of commercially available tools, intensive automated and manual third-party penetration efforts, quality assurance processes, software security reviews and external audits.
Syncari products run on Google Cloud Platform and follow Google’s best practices for the security of our products and services. As a result, all the benefits of Google’s technology and security practices are passed through to our customers.
Syncari also inherits the security posture of Google Cloud Platform for Data Centers. The Google data center’s physical security features a layered model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection.
Syncari’s security team actively scans for security threats using commercial and custom tools, penetration tests, quality assurance (QA) measures and software security reviews. In addition, the team performs third-party penetration tests annually that include external break-in, and blackbox and whitebox testing of our environments.
Syncari’s security monitoring program is focused on information gathered from internal network traffic, employee actions on systems and outside knowledge of vulnerabilities. At many points across our global network, internal traffic is inspected for suspicious behavior, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of open-source tools for traffic capture and parsing.
Additional resources