Your data stays secure,
private, and fully compliant
We adhere to top-tier, enterprise-level security practices and protocols, ensuring the highest standard of data protection and system integrity for our clients.
Security Credentials
SOC 2 Type II Certified
SOC 2 Type II certifcation focuses on five key trust service principles: security, availability, processing integrity, confdentiality, and privacy. These controls ensure that our systems are secure, available as committed, processing data accurately, maintaining data confdentiality, and protecting the personal information of users.
ISO 27001 certified
We are an ISO 27001 certifed organisation. We follow the global standards of security guidelines to ensure data security for our clients. We follow the best practices for establishing, implementing, maintaining and continually improving our information security management systems.
GDPR Compliant
We comply with the General Data Protection Regulation (GDPR). GDPR is a leading standard for implementing, managing, and strengthening a risk-based data privacy management system. We give you the freedom you need to comply with local data protection regulations like GDPR.
SSO and access management
We help you set up stable login procedures that are customised to your team's individual configuration needs. The platform can be easily integrated with your CRM and HRMS systems through SSO. Sharpsell can also be configured to work with platforms that support OpenID and SAML 2.0, such as Microsoft Active Directory, Salesforce, and Octa.
Secure cloud infrastructure
We only work with the most secure cloud infrastructure providers, such as Amazon Web Services, and Microsoft Azure. Our servers are housed in state-of-the-art data centres that have received several certifications, including ISO/IEC 27001 and SOC2. You can be assured that your data is always safe and confidential thanks to our cloud security practices.
End to end encryption
To ensure that our products are still stable, we integrate OWASP Top 10 information security practices and extensive testing into our software development lifecycle. At every stage of our development process, we pay close attention to privacy and protection, culminating in the following key capabilities:
Secure engineering processess
To ensure that our products are still stable, we integrate OWASP Top 10 information security practices and extensive testing into our software development lifecycle. At every stage of our development process, we pay close attention to privacy and protection, culminating in the following key capabilities:
- Advanced fle permissions
- Advanced admin permissions
- Role based and user based content access controls
- Anonymized user analytics and insights
- Custom company and content specifc disclaimers