Trust Center

Security at SupportFinity

Protecting customer data is fundamental to our business. This page summarizes the practices and controls we use to keep your data secure. Detailed documentation is available to qualified parties under NDA.

Infrastructure

SupportFinity runs on Google Cloud Platform with workloads hosted in the United States. Production services are deployed on managed, containerized infrastructure with isolated environments for staging and production.

  • Managed compute with automatic patching
  • Private networking between application and data tiers
  • Secrets stored in a managed key-management service, never in source code

Data protection

Customer data is encrypted in transit and at rest by default.

  • TLS 1.2+ for all network traffic
  • AES-256 encryption at rest for databases, caches, and backups
  • Regular automated backups with documented restore procedures

Application security

Security is built into our development lifecycle, not bolted on afterwards.

  • Google CASA-verified application security
  • Mandatory peer code review for all production changes
  • Static analysis and dependency vulnerability scanning in CI
  • Separate staging environment for pre-production testing

Access control

Access to production systems and customer data follows the principle of least privilege.

  • Single sign-on with multi-factor authentication for employee access
  • Role-based access controls scoped to job function
  • Audit logs for administrative actions, retained per policy
  • Regular access reviews

People

Our team is screened, trained, and accountable for protecting customer data.

  • Background checks for new hires where legally permitted
  • Security awareness training at onboarding and annually
  • Confidentiality and IP assignment agreements for all personnel

Incident response

We maintain a documented incident response process. In the event of a confirmed security incident affecting customer data, we notify impacted customers without undue delay and within timeframes required by applicable law.

Compliance and certifications

We design our controls to meet recognized industry standards.

  • Google CASA verified
  • GDPR and CCPA aligned
  • Standard Contractual Clauses available for cross-border transfers
  • Data Processing Agreement available on request
  • SOC 2 Type II on our roadmap

Reporting a security concern

If you believe you have discovered a vulnerability or want to request our security documentation, contact our security team at info@supportfinity.com. We acknowledge reports within two business days.

One Platform. Infinite Possibilities.

Whether you are sourcing the next unicorn employee or looking for a remote role, SupportFinity connects the dots with AI.

One Platform. Infinite Possibilities.

Whether you are sourcing the next unicorn employee or looking for a remote role, SupportFinity connects the dots with AI.

One Platform. Infinite Possibilities.

Whether you are sourcing the next unicorn employee or looking for a remote role, SupportFinity connects the dots with AI.