Syncari Security and Trust Center

Syncari was designed to be secure from the beginning. Our security capabilities are core to our platform so you can focus on maximizing the value of your data, not protecting it.

Request a Demo Read our Security Overview
Syncari Security and Trust Center
  • chargebee
  • servicemax
  • industrial
  • dremio
  • >
  • matterport
  • >
  • greenhouse
Secure By Design

Modern Data Security Baked in, not Bolted On

Comprehensive & Centralized Data Security

Entrust your customer data to Syncari. Our platform includes a multitude of data policies such as PII data masking and encryption for data in transit and at rest that can be enforced across your entire tech stack.

Industry & Government Compliance

Data privacy and protection is core to what we do. Our SOC 2 Type II and support for GDPR, CCPA and Privacy Shield compliance validate our commitment to exceeding the level of security required by industry, state and federal governments.

Infrastructure Security & Resiliency

Built for the cloud, Syncari leverages the most sophisticated cloud security technologies available. The result is a platform that is secure and resilient, giving you the confidence to enable your most demanding data workloads with Syncari.

Syncari implements layered security controls designed to protect and secure your customer data. We incorporate multiple logical and physical security controls including access management, least privilege, strong authentication, logging and monitoring, vulnerability management, and many others.

Testimonial
Neelesh Shastry

CTO, CISO and Co-Founder, Syncari

Trust and Security Starts With Transparency

Syncari is committed to the security of our customers and their data.

Compliance Program

Syncari's products and services are regularly and independently verified against industry-leading compliance, privacy, and security standards to help support your organization’s compliance needs. Syncari supports Privacy Shield, CCPA and GDPR compliance. Additionally, Syncari can provide HIPAA Business Partner Agreements and complies with GLBA practices for securing infrastructure and applications. Our SOC 2 Type II report is audited annually.

Data Usage & Access

Syncari customers own their data. The data that customers put into our systems is theirs, and we do not scan it for advertisements nor sell it to third parties. We offer our customers a detailed data processing amendment that describes our commitment to protecting customer data. To keep data private and secure, Syncari logically isolates each customer’s data from that of other customers and users, even when it’s stored on the same physical server.

Vulnerability Management

Syncari administrates a vulnerability management process that actively scans for security threats using a combination of commercially available tools, intensive automated and manual third-party penetration efforts, quality assurance processes, software security reviews and external audits.

Vulnerability Management

Infrastructure Security

Syncari products run on Google Cloud Platform and follows Google’s best practices for security of our product and services. As a result, all the benefits of Google’s technology and security practices are passed through to our customers.

Data Center Security

Syncari also inherits the security posture of Google Cloud Platform for Data Centers. The Google data center’s physical security features a layered model, including safeguards like custom-designed electronic access cards, alarms, vehicle access barriers, perimeter fencing, metal detectors, and biometrics, and the data center floor features laser beam intrusion detection.

Data Center Security
Data Center Security

Product Security & Testing

Syncari’s security team actively scans for security threats using commercial and custom tools, penetration tests, quality assurance (QA) measures and software security reviews. In addition, the team performs third-party penetration tests annually that include external break-in, and blackbox and whitebox testing of our environments.

Monitoring

Syncari’s security monitoring program is focused on information gathered from internal network traffic, employee actions on systems and outside knowledge of vulnerabilities. At many points across our global network, internal traffic is inspected for suspicious behavior, such as the presence of traffic that might indicate botnet connections. This analysis is performed using a combination of open-source tools for traffic capture and parsing.

Continue your journey

Additional Resources

Security Overview

Security Overview

A description of our current security posture, organizational and technical controls, and how we're continually improving our security practices to protect our customer data.

See Security Overview >
Privacy Policy

Privacy Policy

Syncari knows you care about how your personal information is used and shared, and we take your privacy seriously. Read the following to learn more about our Privacy Policy

Learn more >
See Syncari in Action

See Syncari in Action

It’s time to stop doubting your data. Request a custom demo of Syncari today.

Request a demo >