SUMit CRM

SUMit CRM

by The American Spreadsheet Company

🔒 Enterprise-Grade Security

Security & Trust

Your business data deserves the highest level of protection. Here's how we keep it safe.

Security practices updated: July 26, 2025

SOC 2 Type II

Audited security controls

GDPR Compliant

EU data protection standards

99.9% Uptime

Reliable infrastructure

Data Protection

Encryption Standards

  • AES-256 Encryption: All data encrypted at rest using industry-standard algorithms
  • TLS 1.3: End-to-end encryption for data in transit
  • Key Management: Secure key rotation and hardware security modules

Data Handling

  • Data Ownership: You own and control your data completely
  • Data Residency: Choose where your data is stored geographically
  • Secure Deletion: Cryptographic erasure within 30 days of deletion

Infrastructure Security

Cloud Infrastructure

  • AWS Hosting: Multi-AZ deployment with automatic failover
  • DDoS Protection: Advanced threat detection and mitigation
  • Network Isolation: Private VPCs and subnet segmentation

Monitoring & Detection

  • 24/7 Monitoring: Real-time security incident detection
  • Intrusion Detection: AI-powered anomaly detection systems
  • Automated Response: Immediate threat isolation and remediation

Access Controls

Authentication

  • Multi-Factor Authentication: Required for all user accounts
  • SSO Integration: Enterprise identity provider support
  • Session Management: Automatic timeouts and secure tokens

Authorization

  • Role-Based Access: Granular permissions and user roles
  • Principle of Least Privilege: Minimal necessary access rights
  • Audit Logging: Complete access and activity tracking

Compliance & Certifications

SOC 2 Type II

Annual third-party audits of our security, availability, and confidentiality controls.

Certified: 2025

GDPR Compliance

Full compliance with European data protection regulations and privacy rights.

Verified: 2025

ISO 27001

Information security management system certification in progress.

Expected: Q2 2025

Backup & Recovery

Data Backup

  • Automated Backups: Continuous data protection with point-in-time recovery
  • Geographic Distribution: Multi-region backup storage for disaster recovery
  • Encryption: All backups encrypted with separate key management

Recovery Procedures

  • RTO: < 4 hours: Maximum recovery time objective for full service restoration
  • RPO: < 15 minutes: Maximum data loss in worst-case scenarios
  • Tested Monthly: Regular disaster recovery drills and validation

Incident Response

Response Team

  • 24/7 Security Team: Dedicated incident response professionals
  • Escalation Procedures: Clear communication and response protocols
  • Customer Notification: Immediate alerts for any security incidents

Response Times

  • Critical: < 15 minutes: Immediate response to critical security events
  • High: < 1 hour: Rapid containment and investigation
  • Post-Incident: Detailed forensics and improvement recommendations

Your Security Responsibilities

Security is a shared responsibility. Here's how you can help keep your data safe:

Account Security

  • Use strong, unique passwords for your SUMit CRM account
  • Enable multi-factor authentication (MFA) for all users
  • Regularly review user access and remove inactive accounts
  • Report suspicious activity immediately

Data Management

  • Only input data that you're authorized to share
  • Regularly review and clean up old or unnecessary data
  • Use our data export features for additional backups
  • Follow your organization's data handling policies

Security Questions or Concerns?

Our security team is here to help. Whether you have questions about our practices or need to report a security issue, we're available 24/7.

Average response time: < 2 hours