🔒 Enterprise-Grade Security
Security & Trust
Your business data deserves the highest level of protection. Here's how we keep it safe.
Security practices updated: July 26, 2025
SOC 2 Type II
Audited security controls
GDPR Compliant
EU data protection standards
99.9% Uptime
Reliable infrastructure
Data Protection
Encryption Standards
- • AES-256 Encryption: All data encrypted at rest using industry-standard algorithms
- • TLS 1.3: End-to-end encryption for data in transit
- • Key Management: Secure key rotation and hardware security modules
Data Handling
- • Data Ownership: You own and control your data completely
- • Data Residency: Choose where your data is stored geographically
- • Secure Deletion: Cryptographic erasure within 30 days of deletion
Infrastructure Security
Cloud Infrastructure
- • AWS Hosting: Multi-AZ deployment with automatic failover
- • DDoS Protection: Advanced threat detection and mitigation
- • Network Isolation: Private VPCs and subnet segmentation
Monitoring & Detection
- • 24/7 Monitoring: Real-time security incident detection
- • Intrusion Detection: AI-powered anomaly detection systems
- • Automated Response: Immediate threat isolation and remediation
Access Controls
Authentication
- • Multi-Factor Authentication: Required for all user accounts
- • SSO Integration: Enterprise identity provider support
- • Session Management: Automatic timeouts and secure tokens
Authorization
- • Role-Based Access: Granular permissions and user roles
- • Principle of Least Privilege: Minimal necessary access rights
- • Audit Logging: Complete access and activity tracking
Compliance & Certifications
SOC 2 Type II
Annual third-party audits of our security, availability, and confidentiality controls.
Certified: 2025
GDPR Compliance
Full compliance with European data protection regulations and privacy rights.
Verified: 2025
ISO 27001
Information security management system certification in progress.
Expected: Q2 2025
Backup & Recovery
Data Backup
- • Automated Backups: Continuous data protection with point-in-time recovery
- • Geographic Distribution: Multi-region backup storage for disaster recovery
- • Encryption: All backups encrypted with separate key management
Recovery Procedures
- • RTO: < 4 hours: Maximum recovery time objective for full service restoration
- • RPO: < 15 minutes: Maximum data loss in worst-case scenarios
- • Tested Monthly: Regular disaster recovery drills and validation
Incident Response
Response Team
- • 24/7 Security Team: Dedicated incident response professionals
- • Escalation Procedures: Clear communication and response protocols
- • Customer Notification: Immediate alerts for any security incidents
Response Times
- • Critical: < 15 minutes: Immediate response to critical security events
- • High: < 1 hour: Rapid containment and investigation
- • Post-Incident: Detailed forensics and improvement recommendations
Your Security Responsibilities
Security is a shared responsibility. Here's how you can help keep your data safe:
Account Security
- • Use strong, unique passwords for your SUMit CRM account
- • Enable multi-factor authentication (MFA) for all users
- • Regularly review user access and remove inactive accounts
- • Report suspicious activity immediately
Data Management
- • Only input data that you're authorized to share
- • Regularly review and clean up old or unnecessary data
- • Use our data export features for additional backups
- • Follow your organization's data handling policies
Security Questions or Concerns?
Our security team is here to help. Whether you have questions about our practices or need to report a security issue, we're available 24/7.
Average response time: < 2 hours