Trust Center

Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Overview

ContainIQ designs its processes and procedures related to its platform to meet its objectives for its services. Those objectives are based on the service commitments that ContainIQ makes to user entities, the laws and regulations that govern the provision of ContainIQ services, and the financial, operational, and compliance requirements that ContainIQ has established for the services. The services of ContainIQ are subject to the security and privacy requirements of state and local privacy security laws and regulations in the jurisdictions in which ContainIQ operates.

Compliance

SOC 2 Logo
SOC 2
Get access to this Trust Center
  • Review sensitive security details
  • Unlock documents
  • Submit security questionnaires
  • Ask for more information
Had access before? Reclaim access

Documents

SOC 2

Risk Profile

Data Access Level
Impact Level
Third Party Dependence
See more

Product Security

Data Security
Integrations
Role-Based Access Control
See more

Reports

Network Diagram
Pentest Report
SOC 2 Report

Data Security

We follow industry best practices for data security. We are happy to provide more details about our data security practices upon request.

App Security

We are happy to provide more details about our app security upon request.

Access Control

Data Access
Logging
Password Security

Infrastructure

Amazon Web Services
Azure
BC/DR
See more

Endpoint Security

Mobile Device Management

Network Security

We protect our corporate network against external & internal threats.

Corporate Security

Email Protection
Employee Training
HR Security
See more

Policies

We are happy to provide more details about our policies upon request.

Security Grades

Qualys SSL Labs
ContainIQ
A

If you think you may have discovered a vulnerability, please send us a note.

Powered BySafeBase Logo