Security

Highest standards of security at Syncly

Your trust and data security is our top priority.

Security

Social listening for the video era

Your trust and data security is our top priority.

Your data is protected by the highest industry standards. Syncly is SOC 2 Type II compliant, and we enforce that standard with continuous, automated monitoring across our entire cloud infrastructure. No compromises.

Data Security
Data Security

All data in Syncly is encrypted in transit and at rest without exceptions. We run and test back-ups on a regular basis on Mongo DB. We use security tools from AWS to manage data and network security, and access controls, in line with industry best practices.

All data in Syncly is encrypted in transit and at rest without exceptions. We run and test back-ups on a regular basis on Mongo DB. We use security tools from AWS to manage data and network security, and access controls, in line with industry best practices.

Cloud Security
Cloud Security

Syncly is hosted on cloud providers like AWS and Mongo DB that have the highest standards for security requirements. Syncly operates entirely within AWS virtual private cloud, with no user data leaves this virtual private cloud. Furthermore, we limit public network access from internal VPC by NACL and security group and continuously and closely monitoring logs.

Syncly is hosted on cloud providers like AWS and Mongo DB that have the highest standards for security requirements. Syncly operates entirely within AWS virtual private cloud, with no user data leaves this virtual private cloud. Furthermore, we limit public network access from internal VPC by NACL and security group and continuously and closely monitoring logs.

Vulnerability Disclosure
Vulnerability Disclosure

If you're a security expert and you believe you've discovered a security-related issue with our systems, we appreciate your help in disclosing the issue to us responsibly. Please reach us at hello@deepbluedot.io.

If you're a security expert and you believe you've discovered a security-related issue with our systems, we appreciate your help in disclosing the issue to us responsibly. Please reach us at hello@deepbluedot.io.

Security Monitored
Security Monitored

Annual penetration-testing audits conducted by a third-party. Network monitoring also is performed by a number of various providers as well.

Annual penetration-testing audits conducted by a third-party. Network monitoring also is performed by a number of various providers as well.

FAQ

Is Syncly SOC 2 compliant?
Is Syncly GDPR compliant?
Do you have a pen test report available to share?
Is Syncly SOC 2 compliant?
Is Syncly GDPR compliant?
Do you have a pen test report available to share?
Is Syncly SOC 2 compliant?
Is Syncly GDPR compliant?
Do you have a pen test report available to share?
Section Image
Section Image
Section Image
Section Image

Build a brand customers love with Syncly

Section Image
Section Image
Section Image
Section Image

Build a brand customers love with Syncly

Section Image
Section Image
Section Image
Section Image

Build a brand customers love with Syncly