Security
Highest standards of security at Syncly
Your trust and data security is our top priority.
Security
Social listening for the video era
Your trust and data security is our top priority.
Your data is protected by the highest industry standards. Syncly is SOC 2 Type II compliant, and we enforce that standard with continuous, automated monitoring across our entire cloud infrastructure. No compromises.

Data Security
Data Security
All data in Syncly is encrypted in transit and at rest without exceptions. We run and test back-ups on a regular basis on Mongo DB. We use security tools from AWS to manage data and network security, and access controls, in line with industry best practices.
All data in Syncly is encrypted in transit and at rest without exceptions. We run and test back-ups on a regular basis on Mongo DB. We use security tools from AWS to manage data and network security, and access controls, in line with industry best practices.
Cloud Security
Cloud Security
Syncly is hosted on cloud providers like AWS and Mongo DB that have the highest standards for security requirements. Syncly operates entirely within AWS virtual private cloud, with no user data leaves this virtual private cloud. Furthermore, we limit public network access from internal VPC by NACL and security group and continuously and closely monitoring logs.
Syncly is hosted on cloud providers like AWS and Mongo DB that have the highest standards for security requirements. Syncly operates entirely within AWS virtual private cloud, with no user data leaves this virtual private cloud. Furthermore, we limit public network access from internal VPC by NACL and security group and continuously and closely monitoring logs.
Vulnerability Disclosure
Vulnerability Disclosure
If you're a security expert and you believe you've discovered a security-related issue with our systems, we appreciate your help in disclosing the issue to us responsibly. Please reach us at hello@deepbluedot.io.
If you're a security expert and you believe you've discovered a security-related issue with our systems, we appreciate your help in disclosing the issue to us responsibly. Please reach us at hello@deepbluedot.io.
Security Monitored
Security Monitored
Annual penetration-testing audits conducted by a third-party. Network monitoring also is performed by a number of various providers as well.
Annual penetration-testing audits conducted by a third-party. Network monitoring also is performed by a number of various providers as well.
FAQ
Is Syncly SOC 2 compliant?
Is Syncly GDPR compliant?
Do you have a pen test report available to share?
Is Syncly SOC 2 compliant?
Is Syncly GDPR compliant?
Do you have a pen test report available to share?
Is Syncly SOC 2 compliant?
Is Syncly GDPR compliant?
Do you have a pen test report available to share?




Build a brand customers love with Syncly




Build a brand customers love with Syncly



