Trust Center

Start your security review
View & download sensitive information
Ask for information

Overview

ContainIQ designs its processes and procedures related to its platform to meet its objectives for its services. Those objectives are based on the service commitments that ContainIQ makes to user entities, the laws and regulations that govern the provision of ContainIQ services, and the financial, operational, and compliance requirements that ContainIQ has established for the services. The services of ContainIQ are subject to the security and privacy requirements of state and local privacy security laws and regulations in the jurisdictions in which ContainIQ operates.

Compliance

SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

Documents

SOC 2

Risk Profile

Data Access Level
Impact Level
Third Party Dependence
View more

Product Security

Data Security
Integrations
Role-Based Access Control
View more

Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security

We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.

App Security

We are happy to provide more details about our app security upon request.

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Azure
BC/DR
View more

Endpoint Security

Mobile Device Management

Network Security

We protect our corporate network against external & internal threats.

Corporate Security

Email Protection
Employee Training
HR Security
View more

Policies

We are happy to provide more details about our policies upon request.

Security Grades

Qualys SSL Labs
ContainIQ
A

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo