SpringCM routinely passes the most demanding third-party security audits, including SSAE 16 and SOC 2. We know how important it is to keep your business contracts and documents away from prying eyes, backed up, and available when you need them. SpringCM keeps IT and security teams happy, and confidential information safe.
Our physical datacenters are located across the country and secured to extremely high standards. The co-location providers we partner with all provide Tier III capabilities, with physical and environmental safeguards sophisticated enough to host banking, healthcare, commercial and government data. Our multiple layers of facility and network redundancy help us meet our two central objectives:
SpringCM’s two-phase backup policy consists of nightly and weekly backups 24x7x365. Each night’s backup is incremental; only data that has changed since the last backup is written to digital media.
In addition to regular backups, SpringCM has many plans in place for any disaster or contingency. Key measures include:
Beyond the physical security measures in place at our datacenters, the SpringCM application itself has many features that keep your data safe. Whether it’s the ability to tailor access and editing controls of documents and folders by individual, group and device, or a combination of enterprise-class external DNS services, content delivery networks and certificate providers - you can be confident your data is protected. Rest assured your data is protected from DDoS, DNSSEC, brute force and root certificate provider threats as it travels back and forth from SpringCM.
SpringCM Mobile features PIN-protection and content encryption on smartphones and tablets. SpringCM Sync allows you to control exactly what content is synced to mobile devices, as well as laptops and desktops. In addition, should it become necessary, SpringCM Sync gives you the ability to selectively wipe specific content.
Our security measures extend to every facet of the company, including our people. All SpringCM employees and contractors with access to critical systems complete a successful third-party background check and execute confidentiality agreements before they start. Employees are also required to fully understand SpringCM’s: