Trust Center

Start your security review
View & download sensitive information
Ask for information
Search items
ControlK

Overview

Welcome to the SPHERE Trust Center. Our entire organization is dedicated to protecting client data and ensuring the confidentiality, availability, and integrity of all SPHERE managed systems and applications. Use this Trust Center to learn about our security posture and request access to documentation.

Compliance

SOC 2 Logo
SOC 2
Start your security review
View & download sensitive information
Ask for information

Documents

Network Diagram
Pentest Report
SOC 2 Report
Software Development Lifecycle
Vulnerability & Patch Management
Anti-Modern Slavery
Data Breach Notifications
Data Access
Password Security
Asset Management Practices
Employee Training
HR Security
Incident Response
Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
Asset Management Policy
Backup Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Data Sanitization Policy
Data Security Policy
Encryption Policy
General Incident Response Policy
Information Security Policy
Internal and External Communication Policy
Network Security Policy
Other Policies
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Third Party Personnel Policy
Vulnerability Management Policy

Risk Profile

Data Access LevelRestricted
Impact LevelLow
Recovery Time ObjectiveImmediate
View more

Product Security

Audit Logging
Data Security
Integrations
View more

Reports

HIPAA Report
Network Diagram
Pentest Report
View more

Self-Assessments

We are working on our security compliance. We can provide completed questionnaires upon request.

Data Security

Access Monitoring
Backups Enabled
Data Erasure
View more

App Security

Responsible Disclosure
Bot Detection
Code Analysis
View more

Data Privacy

Data Breach Notifications
Data Into System
Data Out of System
View more

Access Control

Data Access
Logging
Password Security

Infrastructure

Status Monitoring
Anti-DDoS
Azure
View more

Endpoint Security

Disk Encryption
DNS Filtering
Endpoint Detection & Response
View more

Network Security

Data Loss Prevention
Firewall
IDS/IPS
View more

Corporate Security

Asset Management Practices
Email Protection
Employee Training
View more

Policies

Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more

Security Grades

We are constantly monitoring the security of our website. We will post our grades from public security rating agencies when they become available.

If you need help using this Trust Center, please contact us.

If you think you may have discovered a vulnerability, please send us a note.

Powered bySafeBase Logo