Highest standards of Security at Syncly
At syncly, we are committed to ensuring we deliver the highest standards of security for our customers. One of the ways to demonstrate this commitment is by being SOC 2 Type II compliant. Furthermore, Syncly monitors for ongoing compliance for all associated cloud assets and resources.
Data Security
All data in Syncly is encrypted in transit and at rest without exceptions. We run and test back-ups on a regular basis on Mongo DB. We use security tools from AWS to manage data and network security, and access controls, in line with industry best practices.
Cloud Security
Syncly is hosted on cloud providers like AWS and Mongo DB that have the highest standards for security requirements. Syncly operates entirely within AWS virtual private cloud, with no user data leaves this virtual private cloud. Furthermore, we limit public network access from internal VPC by NACL and security group and continuously and closely monitoring logs.
Vulnerability Disclosure
If you're a security expert and you believe you've discovered a security-related issue with our systems, we appreciate your help in disclosing the issue to us responsibly. Please reach us at hello@deepbluedot.io.
Security Monitored
Annual penetration-testing audits conducted by a third-party. Network monitoring also is performed by a number of various providers as well.