Syncari Security & Trust Center

Syncari was designed to be secure from the beginning. Our security capabilities are core to our platform so you can focus on maximizing the value of your data, not locking it down.

SECURE BY DESIGN

Modern data security baked in, not bolted on

Trust & security starts with transparency

Syncari is committed to the security of our customers and their data.

Compliance program

Syncari’s products and services are regularly and independently verified against industry-leading compliance, privacy, and security standards to help support your organization’s compliance needs. Syncari supports Privacy Shield, SCCs, CCPA and GDPR compliance. Additionally, Syncari is HIPAA compliant and can provide HIPAA Business Partner Agreements and complies with GLBA practices for securing infrastructure and applications. Our SOC 2 Type II and HIPAA certifications are audited annually.

 

Data usage & access

Syncari customers own their data. The data that customers put into our systems is theirs, and we do not scan it for advertisements nor sell it to third parties. We offer our customers a detailed data processing amendment that describes our commitment to protecting customer data. To keep data private and secure, Syncari logically isolates each customer’s data from that of other customers and users, even when it’s stored on the same physical server.

 

Vulnerability management

Syncari administrates a vulnerability management process that actively scans for security threats using a combination of commercially available tools, intensive automated and manual third-party penetration efforts, quality assurance processes, software security reviews and external audits.

Syncari Certs

Infrastructure security

Syncari products run on Google Cloud Platform and follow Google’s best practices for the security of our products and services. As a result, all the benefits of Google’s technology and security practices are passed through to our customers.

 

Data center security

Syncari also inherits the security posture of Google Cloud Platform for Data Centers. The Google data center’s physical security features a layered model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection.

Google Cloud Security

Product security & testing

Syncari’s security team actively scans for security threats using commercial and custom tools, penetration tests, quality assurance (QA) measures and software security reviews. In addition, the team performs third-party penetration tests annually that include external break-in, and blackbox and whitebox testing of our environments.

 

Monitoring

Syncari’s security monitoring program is focused on information gathered from internal network traffic, employee actions on systems and outside knowledge of vulnerabilities. At many points across our global network, internal traffic is inspected for suspicious behavior, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of open-source tools for traffic capture and parsing.

Security Controls

Additional resources

Continue your journey

Wordpress Social Share Plugin powered by Ultimatelysocial