Start your security review
View & download sensitive information
Ask for information
Search items
Overview
Welcome to Userlytics's Trust Center. Our commitment to data privacy and security is embedded in every part of our business. Use this Trust Center to learn about our security posture and request access to our security documentation.
Compliance
CCPA
GDPR
ISO 27001
PCI DSS
Privacy Shield
Start your security review
View & download sensitive information
Ask for information
Documents
Network Diagram
ISO 27001
PCI DSS
Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
Asset Management Policy
Business Continuity Policy
BYOD Policy
Data Classification Policy
Data Sanitization Policy
Encryption Policy
General Incident Response Policy
IMS Policy
Information Security Policy
Internal and External Communication Policy
Other Policies
Password Policy
Physical Security
Risk Management Policy
Software Development Lifecycle
Third Party Personnel Policy
Vulnerability Management Policy
Servers Network Diagram
Userlytics Security Questionnaire
Risk Profile
Data Access LevelRestricted
Impact LevelLow
Recovery Time Objective24-48 hours
View more
Product Security
Audit Logging
Data Security
Multi-Factor Authentication
View more
Reports
Network Diagram
Self-Assessments
Other Self-Assessments
Data Security
Backups Enabled
Encryption-at-rest
Encryption-in-transit
View more
App Security
Code Analysis
Credential Management
Secure Development Training
View more
Legal
We take legal matters seriously and we always engage our legal counsel to review all commercial activities. Please contact us if you have any questions.
Data Privacy
Privacy of customer data is top of mind. We follow industry best practices and follow all applicable privacy regulations.
Access Control
Data Access
Logging
Password Security
Infrastructure
Amazon Web Services
Anti-DDoS
BC/DR
View more
Endpoint Security
Disk Encryption
Endpoint Detection & Response
Mobile Device Management
View more
Network Security
Data Loss Prevention
Firewall
IDS/IPS
View more
Corporate Security
Asset Management Practices
Employee Training
Incident Response
View more
Policies
Acceptable Use Policy
Access Control Policy
Anti-Malicious Software Policy
View more
Security Grades
SecurityScorecard
Userlytics
CIS Score
SLES
5
Qualys SSL Labs
Public web
Dashboard
View more
If you think you may have discovered a vulnerability, please send us a note.