Highest standards of Security at Syncly

Highest standards of Security at Syncly

Highest standards of Security
at Syncly

Your trust and data security is our top priority.

Your trust and data security is
our top priority.

At syncly, we are committed to ensuring we deliver the highest standards of security for our customers. One of the ways to demonstrate this commitment is by being SOC 2 Type II compliant. Furthermore, Syncly monitors for ongoing compliance for all associated cloud assets and resources.

Data Security

All data in Syncly is encrypted in transit and at rest without exceptions. We run and test back-ups on a regular basis on Mongo DB. We use security tools from AWS to manage data and network security, and access controls, in line with industry best practices.

Cloud Security

Syncly is hosted on cloud providers like AWS and Mongo DB that have the highest standards for security requirements. Syncly operates entirely within AWS virtual private cloud, with no user data leaves this virtual private cloud. Furthermore, we limit public network access from internal VPC by NACL and security group and continuously and closely monitoring logs.

Vulnerability Disclosure

If you're a security expert and you believe you've discovered a security-related issue with our systems, we appreciate your help in disclosing the issue to us responsibly. Please reach us at hello@deepbluedot.io.

Security Monitored

Annual penetration-testing audits conducted by a third-party. Network monitoring also is performed by a number of various providers as well.

FAQ

FAQ

Is Syncly SOC 2 compliant?

Is Syncly GDPR compliant?

Do you have a pen test report available to share?

Is Syncly SOC 2 compliant?

Is Syncly GDPR compliant?

Do you have a pen test report available to share?

Get started with Syncly today

Sign up for a free trial

Book a Demo

Get started with Syncly today

Sign up for a free trial

Book a Demo

Get started with

Syncly today

Sign up for a free trial

Book a Demo